Skip to content

Entries from August 2019

Using Tor to protect against certificate injection by Hotspots

Tor is typically used to attain anonymity and preserve privacy online. This is by far the most common and appealing use for it. Most people without such concerns are not likely to ever install a Tor browser on their workstations, and it’s a pity; Tor has at least one additional use-case which is applicable to a much larger audience. This use-case is the prevention of certificate injection when using untrusted network connections.

Continue reading "Using Tor to protect against certificate injection by Hotspots"