Merely having Tor software may be used against you in Court?

In other words, Tor:

Solari said Winner’s laptop also contained software that could enable her to access online black-markets and buy items — such as a fake ID or passport — without revealing her identity or location.

Source: Accused NSA leaker wanted to ‘burn the White House down’ | New York Post

They can make the same allegation about encryption. Attempting to protect your medical, financial and educational records is a sign of nefarious intent?

Every journalist in existence, if they are any good at all, has Tor on their computer. So do private industry analysts reviewing competitor’s products and government policy plans. Tor is a browser that assists with anonymous browsing and accessing web sites as it hides one’s true IP address from the destination web server. There are numerous and valid reasons to use Tor to access publicly available information.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s