was actually developed by the U.S. military so its probably pretty secure from anything but the [
or groups at that level (who very likely have government backing , korean nationalist hackers, chinese or iranian among others , never heard of the hackers-on-meth being sponsored by Trump so far though lol)
don't know if musing implemented hyperlinks yet but i just tend to, its a habit in case it goes post to blog or copied for a part into a reply i give somewhere.
I'll try to summarize :
when you install tor on your desktop it connects to a "node" , which is nothing but someone else running tor on their pc in most cases, all data is encrypted, so whatever you send can not be seen by the next, or any intermediary node, for anything but a bunch of garbled characters. It uses multiple 'hops' across multiple nodes where no node actually knows where its going to (so far in theory, man in the middle sometimes goes a long way and someone who found out might not want to share but i dont think its compromised as such)
until it reaches the last node which is called the "exit node", very likely just someone like you running tor on their pc and sharing a bit of their bandwidth with whoever passes their data through, only at the last node the data gets decrypted into the "final destination", the url you typed or the link you clicked and the LAST node does not have the I.P.-address of the first node, which, all in all makes it pretty anonymous and secure, however if you accept cookies or enter passwords or personal data on the remote site you access you might as well not since you give away info like that anyway, so its mostly associated with the dark and deepweb (the .onion extensions of which i have a list somewhere im not posting here lol, besides those things change constantly and like 90% of the overweb (which is only a fraction of the whole internet really, the dark and deep is bigger)
as in TFA
*4% of the content is only available for the general public in the entire ocean of the web.*
which leave 96% hidden in dark corners on private or home-servers, accessible only through invite or if you know the link, there's no dark-google although a few sites try to keep lists and have some kind of search engine but the links change all the time so thats mostly useless.
I have quite the inquisitive nature so when presented with the opportunity i somewhat dont have a choice but to go look at it, but if you're not very confident in what you're doing or you're not ready to format c: afterwards on a windows pc i'd say stay away hahah. You have a LOT of scams there, selling dope or guns for bitcoin, most of it isnt real, (a wrong picture the fed has btw) its just someone trying to lure you into sending them money, but there ARE ofcourse, and those are listed and rated, probably better than ebay or amazon
you get hitmen on the darkweb trying to get your coin but afaik there ARE NO HITMEN ON THE DARKWEB ... only fools would advertise that and its how they got to silkroad
a costly government fiasco like killing escobar that took lots of time and resources and in the end gave birth to 10 silkroads instead of one (so to speak)
if you just want to hide your ip to counter geo-blocking or whatever for i think a vpn is your best option, tor is slow, its not meant for large data transfers, it was built for secure comms, and comms in text dont require much bandwidth, even less when encoded or packed
i have vpn that costs about €6 per month with dozens of nodes across the planet from here to australia and then around the other half
i dont think thats too much for some privacy, but keep in mind, cookies track
and the analytics at the money-level of the big five are capable of stuff you wouldnt believe, thing is the vpn you use should clearly state that it does NOT keep logs, a vpn that keeps logs is pointless. If some government d*ck thinks its summertime and gets bored they can just waltz in get the servers and read the logs and bob's their uncle
even a vpn that doesnt can , when raided on suspicion of some patriot-type anticivilian-rights thing still be compromised unless they shred all data on the moment it goes through and even THEN, some fed-team could walk in, take over and observe :) put a machine in the middle and tcpdump the whole lot or simply log in with admin access after forcing it out ot some dev's hands and look at all the data coming through
"live" so to speak
but those are extreme conditions ofcourse, however copyright is the new terrorism so i dont think its beyond them
make sure your cookies get removed when you close for anything but passwords (unless you dont mind typing 32 or more character sequences everytime you boot up)
and if possible set the vpn up so it disconnects the network the moment it loses connection to the server
but there might still be some spillage
none of that really matters unless you would be under active investigation (in which case you are either set up or have been keeping some weird friends or some strange behavioural pattern like using 10 times the electricity a house like yours should have)
99.9% probably doesnt use it for kiddie pron and i doubt commercial vpns would allow that anyway but you know how the fed goes "if you dont have anything to hide than why are you wearing underpants, sir? "
Tor itself is secure, which allows you to surf web with anonimity. This will result that harder to be track by ISP. Therefore, you are just being anonymous but not hidden.
I used to use tor for a certain purpose, but I find the experience is that the connections are slow in general.
Personally, I prefer using VPN which is much faster and I can use public WiFi with VPN instead of TOR. If you want extra secure, maybe TOR on top of VPN LOL...
Well, your question is challenging. People use the browser of their choice, it dosn't depend on how they see it secure or not, it is based on their choice, seeing people think its unsecure and dont want to use, so it is their choice.
On musing we dont downgrade a particular platform/browser.
It is just left to the user.