Cyph + Tor = Privacy & Anonymity
Using Cyph secures your data and ensures that prying eyes won’t see the content of your data, but many inferences can still be made from metadata — like the fact that you’re connecting to an encrypted communication service at all, or even (with NSA-level access) potentially identifying that you’ve sent encrypted messages to certain users at certain times.
(We actually already partially mitigate this type of analysis by obfuscating the data sent over the network through various methods, such as padding each message with data of a random length, automatically sending random messages back and forth, and splitting traffic for each conversation all over the globe.)
Privacy
Can I determine the contents of your message?
Anonymity
Can I determine who you are and/or who you’re communicating with?
1. Setting up Tor
a. Tor Browser Bundle Setup
Want Tor to really work? You need to change some of your habits, as some things won’t work exactly as you are used to.
Download Tor Browser
Before you install TBB, be sure to check verify the package signature. This will ensure that the software you install is exactly what it should be. If the signature doesn’t match, it’s possible someone has altered the package you downloaded with malware, or more plausibly that the data is corrupt somehow. Either way you don’t want to install it unless it matches.
Once you’ve verified the signature, run the package you downloaded. On Mac, drag the Tor Browser icon to the application folder; on Windows follow the setup wizard. It’s pretty foolproof. You’ll then have a Firefox fork installed which will connect to the Tor network every time you launch it. Please note that this does not route all your traffic through Tor, only traffic in the Tor Browser. If you’d like to route all your traffic, look into the more advanced setup below.
b. Tor Proxy Setup
If you’re looking for the advanced approach, chances are you won’t need my help getting set up, but here are some useful resources to point you in the right direction. Again, you don’t need to complete these steps if you’ve already downloaded the Tor Browser Bundle.
2. Connecting to Cyph
Tin Foil Hat: If you want to be extra careful, you can also connect through a SOCKS proxy or VPN; however this might further degrade performance.