by CIO Staff

Browser Lets Users Surf Web Without a Trace (UPDATED)

News
Sep 20, 20062 mins
Data CenterPrivacy

Since this story was originally posted, it has been updated to correct a description of the Torpak browser.

A tweaked version of the Firefox browser that makes Web browsing anonymous has been released by a group of privacy-minded coders.

Every few minutes, the Torpark browser causes a computer’s IP address to appear to change. IP addresses are numeric identifiers given to computers on the Internet. The number can be used along with other data to potentially track down a user, as many websites keep track of IP addresses.

Torpark’s creators, a group of computer security gurus and privacy experts named Hactivismo, said they want to expand privacy rights on the Internet as new technologies increasingly collect online data.

The browser is free to download here. It’s a modified version of Portable Firefox, an optimized version of the browser that can be run off a USB memory stick on a computer.

The Torpark browser uses encryption to send data over The Onion Router, a worldwide network of servers nicknamed “Tor” set up to transfer data to one another in a random, obscure fashion.

Internet traffic, such as website requests, carries information on where it came from and where it’s going. But that’s muddled using Tor, which has been endorsed by the Electronic Frontier Foundation, and is hard to trace back to a source.

One minor downside is that surfing with Torpark is slower than with a typical browser over the same connection.

Torpark cautions that data sent from the last Tor server to the website is unencrypted. Since only the user’s connection is anonymous, Torpark advises that sensitive data such as user names and passwords should be used only when the browser displays a golden padlock, a sign that a website is using encryption.

Torpark’s user interface appears similar to Firefox with a few changes. It shows the current IP address that would be seen by websites in the lower right-hand corner, and features a special “Flush Tor” button to reset a new, random server connection.

A test of Torpark using a computer in London employed IP addresses of servers registered in Berlin and Madison, Wis.

-Jeremy Kirk, IDG News Service (London Bureau)

Related Links:

  • Web Browser Looks to Eliminate User Footprints

  • German Police Seize ‘Anonymizing’ Tor Servers

Check out our CIO News Alerts and Tech Informer pages for more updated news coverage.