Skip to Main Content

Digital Security and Privacy

TOR Browser

This browser is based on Firefox and has several levels of encryption. It uses the TOR network to protect your identity even the websites you visit cannot tell who or where you are, only that you are using the TOR network for access.

Some sites and platforms are specifically secured for use with TOR. This is represented by domains ending with .onion, which are not accessible using a standard browser. Wikipedia shows a list of some of these Onion services, and links are available on GitHub. When you hear about the "dark web", it is usually a reference to onion services.

TOR is banned in China and several other countries. This leads to a virtual arms race in which TOR develops ways to bypass such blockades.

Virtual Private Networks (VPN)

VPNs act as tunnels that encrypt and contain/hide your data on the way from your computer to your VPN provider, before accessing the original target website or service. When VPN software is running on your computer:

  • It carries all your electronic communications through its tunnel, including FTP, e-mail, or other applications using the Internet.
  • Your Internet Service Provider (ISP) and any other observer still have knowledge of you transferring something, but they cannot see what.
  • Websites you access cannot see your actual IP address but rather that of your VPN provider.

Like TOR, VPNs are banned in some countries.

The IHEID VPN
This VPN can be used:

  • To access the Library's electronic resources.
  • To securely transfer data to or from your drive on the Graduate Institute's servers.

It is a selective VPN, meaning that it filters out data that is not directly related to the Institute (e.g. Youtube) and cannot help you simulate a Swiss presence to circumvent geolocation on websites not related to our network or subscriptions (e.g. Netflix).

Other VPN
Using other VPN services could help you access data that is restricted to specific countries (geoblocked content) or just hide your identity when consulting sensitive resources.

The problem with VPN
Unlike TOR, some VPNs require identification and some providers keep a trace of your data usage, which makes you vulnerable if they are hacked or if they have bad intentions themselves. VPNs based in the USA are also vulnerable to legal requests by the surveillance authorities.

  • For activists, RiseUp.net (which does not require authentification) is recommended by Tactical Tech.
  • Similarly, Mullvad.net focuses on user privacy and does not collect any client data.

Other popular VPNs could be appropriate for other purposes (especially watching geo-blocked media), but their policy, reputation, and headquarters are things you should verify before adopting one: they might be making matters worse if what you are concerned about is security and privacy.