


Both browsers can be used at the same time, provided you don't mix what you use them for. In the simple case of sensitive vs unsensitive, use a single browser for sensitive use only, and another for unsensitive, potentially identifying use. To be specific: use a unique browser profile (or TBB install) for each identity you wish to have, and don't mix them. It's not completely clear from the question whether you would be exposed to this, but the best mitigation would be to never use your sensitive browser for purposes that could identify you, and ensure it doesn't store cookies over sessions. Of course, this highlights a generic attack that isn't limited to the NSA.

They could do this through compromising / owning the exit node, or one of their other internet-scale programs to modify traffic between the exit node and the intended server. My guess is that the NSA uses frame injection to surreptitiouslyįorce anonymous users to visit common sites like Google and Facebook Schneier believes the NSA's QUANTUMCOOKIE program may modify a (sensitive) page you are viewing over Tor, to inject a part of another website that will trigger your browser to send identifying cookies:

Secondly you need to be careful to avoid helping passive attackers carry out timing attacks. First and most significantly: modification of pages you are viewing to expose your identity if your sensitive browser holds identifying cookies. Want to learn more about Tor? Here’s a complete guide.Yes, you can use both a browser with a direct connection to the internet and a browser that uses the Tor proxy to access the internet (such as the Tor Browser Bundle), and still have the anonymity benefits of Tor when using the right browser. However, because a lot of illegal activity does take place over Tor, simply connecting to it could arouse suspicions from law enforcement or your ISP. And some people use it to access websites censored in their country, including popular ones like Facebook. It is an important tool for dissidents and whistleblowers to communicate covertly. A more secure option is TAILS, an entire operating system that allows you to route all your data, from all programs, through the Tor network. The Tor Browser by default only protects your browsing data, not other applications running on the side, which all have to be configured separately. Though Tor is pretty much the gold standard for anonymizing your internet traffic, the system is slow and inefficient. The Tor Browser is optimized for security and privacy, unlike most other web browsers, which are optimized for speed and do not defend adequately against attacks such as browser fingerprinting. The Tor network is typically accessed through the Tor Browser, which is derived from Firefox.
