Thursday , June 5 2025
orbot

Orbot: The Much-Needed Tor for Android and iOS!

What Is Orbot?

Orbot is a free app created by the Guardian Project. It helps protect your privacy by routing your internet traffic through the Tor network, which encrypts your data and conceals your online activity, keeping your identity and location private.

CVSS 9.6: IBM QRadar & Cloud Pak Security Flaws Exposed

IBM has issued a security advisory for vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms. These...
Read More
CVSS 9.6: IBM QRadar & Cloud Pak Security Flaws Exposed

ALERT
Thousands of IP addresses compromised nationwide: CIRT warn

As Bangladesh prepares for the extended Eid-ul-Adha holidays, the BGD e-GOV Computer Incident Response Team (CIRT) has issued an urgent...
Read More
ALERT  Thousands of IP addresses compromised nationwide: CIRT warn

New Android Malware ‘Crocodilus’ Targets Banks in 8 Countries

In March 2025, the Threatfabric mobile Threat Intelligence team identified Crocodilus, a new Android banking Trojan designed for device takeover....
Read More
New Android Malware ‘Crocodilus’ Targets Banks in 8 Countries

Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks

Qualcomm has issued security patches for three zero-day vulnerabilities in the Adreno GPU driver, affecting many chipsets that are being...
Read More
Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks

Critical RCE Flaw Patched in Roundcube Webmail

Roundcube Webmail has fixed a critical security flaw that could enable remote code execution after authentication. Disclosed by security researcher...
Read More
Critical RCE Flaw Patched in Roundcube Webmail

Hacker claim Leak of Deloitte Source Code & GitHub Credentials

A hacker known as "303" claim to breach the company's systems and leaked sensitive internal data on a dark web...
Read More
Hacker claim Leak of Deloitte Source Code & GitHub Credentials

CISA Issued Guidance for SIEM and SOAR Implementation

CISA and ACSC issued new guidance this week on how to procure, implement, and maintain SIEM and SOAR platforms. SIEM...
Read More
CISA Issued Guidance for SIEM and SOAR Implementation

Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

The Qualys Threat Research Unit (TRU) found two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities....
Read More
Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

Australia enacts mandatory ransomware payment reporting

New ransomware payment reporting rules take effect in Australia yesterday (May 30) for all organisations with an annual turnover of...
Read More
Australia enacts mandatory ransomware payment reporting

Why Govt Demands Foreign CCTV Firms to Submit Source Code?

Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require...
Read More
Why Govt Demands Foreign CCTV Firms to Submit Source Code?

How Does Orbot Work?

Here’s a breakdown of how Orbot utilizes the Tor network to provide anonymity:

Entry Node:
When using Orbot with an app, your data is first sent to an entry node in the Tor network, similar to giving a sealed letter to a trusted friend in a big city to forward it for you.

Relay Nodes: Obfuscating the Path:
The starting node in the Tor network doesn’t know your final destination. It randomly selects another relay node which then sends the encrypted data. This double encryption makes it impossible to decipher the content or your identity.

The Onion Routing Magic:
Here’s where the name “Tor” comes in.

Relay nodes in the network remove one layer of encryption, similar to peeling an onion. However, unlike an onion, relay nodes only know the previous and next node in the chain, not the entire path.

Onion routing makes it hard for monitors to track data to its origin or destination.

Exit Node: The Final Stop:

Data passes through relay nodes and reaches the exit node before being decrypted and sent to the website. Each node changes your IP address, making it difficult for anyone to identify or track you.

What Can You Use Orbot For?

Orbot offers a variety of benefits for users seeking online privacy and anonymity. Here are some common use cases:

Accessing Censored Content: In countries with strict internet censorship, Orbot allows you to bypass restrictions and access blocked websites or services. This can be particularly useful for:

Journalists and activists researching sensitive topics in censored regions.
Citizens seeking access to information and resources that their governments restrict.People want to explore a wider range of content and perspectives online.

Protecting Your Privacy on Public Wi-Fi:

Public Wi-Fi networks are notoriously insecure, making your data susceptible to interception. Orbot encrypts your internet traffic on public Wi-Fi, adding a layer of protection for activities like:Online banking and financial transactions.
Accessing personal email accounts and social media profiles.
Sending and receiving sensitive documents.
Communicating Anonymously:

Whether you’re using a chat app for casual conversations or a platform for more sensitive communication, Orbot can help shield your identity from:

Government surveillance in countries with heavy monitoring programs.
Hackers and malicious actors trying to intercept your online communication.
Third-party trackers who collect data about your online activity.
Researching Sensitive Topics:

If you’re researching sensitive topics that could put you at risk of retaliation, Orbot can help anonymize your online searches and browsing activity. This can be beneficial for:
Whistleblowers uncovering wrongdoing or corruption.
Individuals researching topics related to human rights, political dissent, or social justice movements.
Anyone wanting to explore controversial topics without revealing their identity.
Download Anonymously (with Caution): While not explicitly endorsed by the Tor Project, some users choose Orbot for anonymous downloads. However, this practice comes with significant risks:

Malware Distribution:

Malicious actors can use the Tor network to distribute malware. It’s crucial to only download files from trusted sources.
Copyright Infringement: Downloading copyrighted material through Tor is illegal and could have legal consequences.

Check Also

mobile

Bank server compromised using customer’s mobile, steal ₹11 crore

Cyber fraudsters hacked the Himachal Pradesh State Cooperative Bank’s server using a customer’s mobile phone. …

Leave a Reply

Your email address will not be published. Required fields are marked *