========= SCRAPER REMOVED AN EMBEDDED LINK HERE ===========
url was:"https://blog.torproject.org/blog/prism-vs-tor"
linktext was:"PRISM vs Tor"
====================================
:
Is it time for a Tor-enabled version of antiX? Imagine a swarm of encrypted Tor nodes on LiveUSBs. Or imagine an encrypted LiveUSB that has Tor and related goodies set up and ready to be used.For now, let's review what Tor can do, what tools go well with Tor to give you defense-in-depth for your communications, and what work needs to be done so we can make it easier to protect communications from instances where the existing centralized communications infrastructure is compromised by the NSA, China, Iran, or by anyone else who manages to get ahold of the keys to the kingdom.
The core Tor software's job is to conceal your identity from your recipient, and to conceal your recipient and your content from observers on your end. By itself, Tor does not protect the actual communications content once it leaves the Tor network. This can make it useful against some forms of metadata analysis, but this also means Tor is best used in combination with other tools.