Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

2.3 Putting VPN to work

This section is part of the amber and green pathways.

This is a photograph of a man using a laptop.
Figure 6

VPN technologies have a range of applications in the real world.

Please complete Quick poll #18 [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)]   now.

Open the poll in a new window or tab then come back here when you’re done.

The TOR browser

The TOR Browser is a web browser designed to maximise the user’s security against attacks on the communications between the user and the wider Internet. TOR stands for ‘The Onion Router’, which is a protocol where the user’s traffic is encrypted and routed through three random TOR relays that could be anywhere in the world, and these relays are changed every few minutes. The third TOR relay then sends the traffic as normal HTTPS traffic without revealing the original source.

TOR can offer security over public wi-fi. An attacker monitoring wi-fi can detect you are using TOR, but that is all.

You can use the TOR browser to access secure sites over public wi-fi. In fact, using random public wi-fi sites and the TOR browser is one of the safest ways for a journalist to send communications in a hostile environment.

By using TOR browser to access ProtonMail and send or receive an encrypted email, an attacker won’t be able to see that you are using ProtonMail to send and receive messages.

When using TOR, you should keep the following points in mind:

  • only download the TOR browser from: https://www.torproject.org/
  • don’t add any ‘addons’ to this browser, they may break the security
  • don’t use a VPN as well as TOR as this may also break some aspects of security.

Once you begin to use TOR, you will also notice some host/domain names that read like the following:

  • 3g2upl4pq6kufc4m.onion
  • 33y6fjyhs3phzfjj.onion
  • propub3r6espa33w.onion
  • facebookcorewwwi.onion
  • nytimes3xbfgragh.onion

These are used in the context of the TOR network and what are termed as ‘Onion Services’, which are typically ‘hidden’ in the TOR network.

You can refer to this TOR blog post for more information on the Onion Services.

The Darknet

The Darknet is a component of the Web that is shielded from normal web surfing, and it can only be accessed through TOR. When referring to sites on the Darknet, people are generally talking about TOR Services. TOR Services allow you to create your own web server and have it accessible only to users of TOR.

TOR Services look like this: http://xizazy2kz32bo3ko.onion

These are not routable on the standard Internet, and cannot be opened using a normal browser.

You may like to watch this interesting YouTube talk on the Darknet by ‘Eli the computer guy’.

Activity 3 Network Security Solutions

Timing: Allow about 5 minutes

Drag and drop to match each security solution to its purpose:

Using the following two lists, match each numbered item with the correct letter.

  1. Firewall

  2. Firewalls and VPNs

  3. VPNs

  4. TOR

  • a.Helping users to feel their networks are secure

  • b.Permitting or denying network connections based on rules

  • c.Keeping the data you exchange on the internet completely private, even from your internet service provider

  • d.Browsing on the ‘Darknet’

The correct answers are:
  • 1 = b
  • 2 = a
  • 3 = c
  • 4 = d