

The Tor network's architecture is set up to block file-sharing traffic outright and, in addition to being risky, P2P over Tor is a risk to your privacy and anonymity.Ĭlients such as BitTorrent are not inherently secure. Tor as a browser is not made for P2P file sharing such as torrenting. By disabling them outright, you achieve a greater level of privacy and security. Additionally, these tools may store cookies and other data from the Tor browser that can be difficult to find and delete. It is a widely-used browser language that may ignore proxy settings and enable tracking by websites. Because of this, these can access and share your private data. Adobe Flash, QuickTime, ActiveX, Java, and JavaScript, among other things, can only run because of your user account privileges. Using active content on Tor is a huge risk. They don't track, log, store, or save anything to their own services or your device.

Other search engines like DuckDuckGo and StartPage are best for use on Tor.
