I am using the Tor Browser Bundle in Ubuntu from a client machine on a restricted network. In part, I do this because it appears that TBB's native encryption allows me to bypass certain network filters which cannot inspect my data packets.
However, how safe is it to transfer sensitive information (data that I publish, sites I visit, pages I read, etc.) from within a restricted network over the Tor Browser Bundle?
Best Answer
Tor should protect you from your local network, if that's what you're worried about.
The problem with Tor is the exit node (whose traffic could be sniffed) but that's hard to predict or manipulate (unless you're the NSA). If you're using SSL over Tor, that's even better.
Personally, I'd opt to just SSH to a server of mine and use its OpenSSH's built in SOCKS proxy.
Then you can set your browser's proxy (remember it has to be a SOCKS proxy, not HTTP - that won't work) to localhost:9090 and boom, your traffic is fully encrypted all the way out to the server.