As for Corgy's comment, I fundamentally disagree with the first article posted. It is a misunderstanding of the available data. the study that was done showed that it was possible to identify a percentage of users, given the right conditions, but it also showed that because of the margin of error, which was approximately 20%, the whole thing was just too unreliable. In other words, you would end up with a list of 1,000,000 users, but 200,000 of them would be false positives, and there is no way to know WHICH 200,000 of them were the mistakes. Perhaps worth the time if you were trying to prevent a terrorist attack, but certainly not to find a closet grow, or a small-time criminal
http://www.wired.co.uk/news/archive/2014-11/20/tor-still-secure
Yeah, that is exactly the point, agree 100 %.
Regarding TOR, it was developed by the US Navy for secure communication on the Internet, but when they realized the identifiable traffic pattern left when using TOR was a dead give-away for US Navy comms, it was released in the wild to obscure who was Navy blokes among all the users. Please also note that TOR is STILL sponsored by various US agencies and Departments.............like I said, make up your own mind about whether to trust TOR or not, and if it is really necessary, ref what Greenjeans said.
I have used TOR but found it slow and hard to use, no doubt due to my superficial knowledge and skills in maneuvering the "shady" net. There is an Android app, Orweb, https://play.google.com/store/apps/details?id=info.guardianproject.browser&hl=en I tried/used it for awhile but found it unreliable, and was often identified as a Honeypot, particularly by sites protected by ZB Block and Stopforumspam, so gave it up.
If I want to be as anonymous as possible, I create a chain of proxies/VPN's, i.e. my VPN is pointed to a proxy which is pointed to another proxy and so on. The more the merrier.....and slooooooooower......Oh well!
