Updated on Jan 23, 2026Crawling with the Tor Protocol (Part 5)Part 5 outlines a Tor-based crawling architecture with code-level flow, proxy failover logic, and operational guidance.
Updated on Jan 23, 2026Why Tor + P2P/Torrent Is Risky (Part 4)Part 4 explains why Tor and BitTorrent are a risky combination: UDP discovery, metadata leaks, and high-volume flows make correlation and deanonymization far easier.
Updated on Feb 13, 2026How the Tor Protocol Works (Part 1)Part 1 explains how Tor circuits, relay roles, onion routing work, plus the threat model and tradeoffs. It sets up the series path toward crawling through Tor.
Updated on Jan 23, 2026How to Use Tor Safely (Part 3)Part 3 explains safe Tor usage, common leaks, and the tools that preserve isolation, from Tor Browser to Tails and Whonix.
Updated on Feb 13, 2026Is Tor + VPN Safe? Part 2: Threat ModelPart 2 compares Tor-only, Tor over VPN, and VPN over Tor, explaining what each observer sees and which setup fits which threat model.