

Unless any of the participants are using VPN clients or any other kind of proxy tool, the IP Address and location for everybody should appear to be the same. Invite participants to visit the site themselves, using their own devices.Explain the concept of sites like these, which is to show users by which IP address their device and its current location are being identified - in the case of this step, the location indicated on either website should align with the actual location of your training.In a browser, visit either What Is My IP? or What Is My IP Address, which includes a map to show perceived location. The Tor Browser Bundle is quite large, so it’s a good idea to prepare this ahead of time, especially if you have a slow Internet connection in the training room.ĭeepening Step 1. A copy of the Tor Browser Bundle installer (a self-extracting archive) for distribution to participants.Tor Browser Bundle, installed on the trainer’s device.Parent Topic(s) Safer Browsing - Anonymity & Circumvention Safer Browsing - Identity Protection and Privacyĭuration 45-60 minutes Materials to Prepare Participants will use the Tor Browser Bundle to create an anonymous connection, confirm that it is working, and change their Tor exit relay. In this Deepening session, participants will learn how to use the Tor Browser Bundle for anonymity and circumvention, to conduct safer browsing actions while accessing sensitive or blocked content online. Safer Communication: PGP/GPG Email EncryptionĬredits Lindsay Beck, Chris Walker Last Updated 2016-05.Safer Browsing - Identity Protection and Privacy.



