Process Hacker will indeed show in "Network" any connections that run below the user's radar. What we cannot know is, if some of them have not actually been put there by Process Hacker. Trustworthy free software is wondreous thing....
Many websites will check you to verify you are a human when we use tor. If we enable javascript to verify we are humans, javascript may steal our privacy
Tor browser provide the feature 'new identity' and 'new tor circuit for this site'. What situations to use the feature?
Look at 'privacy and security settings' in tor browser. Are there any people use high security level?
You might disable it when being past verification...if human verification is required or not also depends on the Tor IP address (exit-node)...for instance sometimes a particular site asks for verification and sometimes not. Like:"Click on all images with a river"... It's useful when you want to apply an additional measure to interrupt tracking. For instance you browse to site a and then you browse to site b and you absolutely don't want a relation....so you demand a new identity before switching to site b I use default. I mainly use tor to get a random IP address...not to 'share' sensitive data...and if yes I use PGP additionally to encrypt. I use tor to browse 'normal/common' web sites...no suspicious or bogus sites.
When we visit some Chinese websits, 百度云加速 will check you to verify you are a human. 百度云加速 seems like a clone or alternative to cloudflare.
We should use virtual machine to prevent the malware and unwanted software. They will steal tor browser privacy. Such as Qihoo 360 I try to use Virtualbox NAT. Is the NAT enough secure/safe?
https://twitter.com/Snowden/status/778585040976502784 Edward Snowden @Snowden Sep 21 http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google
What do you mean by NAT - Network Address Translation? AFAIK any router uses it, to connect to a modem directly is not recommended either way. Your local network/device(s) should be behind a router and no unneeded ports should be forwarded. Security means always a healthy balance to usability. There is no absolute security. You also can get malware installed on VM and each time you boot the VM it also runs. If you are afraid of that, you can always live boot an OS without installation of it, which also brings disadvantages (less usability/static OS.) But you always boot the same all the time unaltered at each session. And if you should get malware it'll vanish at shut down...
Some people says JavaScript maybe see your IP address and geographical position. How well can you do it? I think that's difficult to do. Could you make a demo?
Tor browser uses three nodes to access the Internet. Tor browser can show the used nodes. Do you look at the used nodes after Tor accesses a website?
Some webpages say the new anonymity networks Riffle , hornet , privategritty and others. Do you know some news about the anonymity networks?
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
Some people say China has cracked Tor. Tor can't hide your IP addresses , if you are in China. How about I2P?
@gorski: Finally! Americans are starting to wake up and realize what we've lost. Now, the long road back to freedom and civil liberties. @mdlgaofei: Nothing is safe. No form of communication is safe. Never think that you are safe. 没有什么是安全的 I hope I said that correctly.