Tor Browser is free software program and an open community that helps you defend in opposition to visitors evaluation, a type of community surveillance that threatens private freedom and privateness, confidential enterprise actions and relationships, and state safety.
Tor Browser protects you by bouncing your communications round a distributed community of relays run by volunteers all all over the world.
It prevents someone watching your Web connection from studying what websites you go to. Additionally it prevents the websites you go to from studying your bodily location, and it permits you to entry websites that are blocked.
The Tor Browser allows you to use Tor on Home windows, Mac OS X, or Linux while not having to put in any software program. It will probably run off a USB flash drive, comes with a pre-configured internet browser to guard your anonymity, and is self-contained (transportable).
Tor Browser doesn’t shield all your laptop’s Web site visitors while you run it. Tor Browser solely protects your functions which can be correctly configured to ship their Web site visitors by Tor. To keep away from issues with Tor configuration, we strongly advocate you employ the Tor Browser. It’s pre-configured to guard your privateness and anonymity on the internet so long as you’re shopping with the Tor Browser itself. Nearly some other net browser configuration is prone to be unsafe to make use of with Tor.
Don’t torrent over Tor
Torrent file-sharing purposes have been noticed to disregard proxy settings and make direct connections even when they’re instructed to make use of Tor. Even when your torrent utility connects solely by Tor, you’ll usually ship out your actual IP handle within the tracker GET request, as a result of that’s how torrents work. Not solely do you deanonymize your torrent site visitors and your different simultaneous Tor internet visitors this manner, you additionally decelerate your entire Tor community for everybody else.
Don’t allow or set up browser plugins
The Tor Browser will block browser plugins similar to Flash, RealPlayer, Quicktime, and others: they are often manipulated into revealing your IP tackle. Equally, we don’t advocate putting in further addons or plugins into the Tor Browser, as these could bypass Tor or in any other case hurt your anonymity and privateness.
Use HTTPS variations of internet sites
Tor will encrypt your site visitors to and inside the Tor community, however the encryption of your visitors to the ultimate vacation spot web site relies upon upon on that web site. To assist guarantee personal encryption to web sites, the browser contains HTTPS In all places to power the usage of HTTPS encryption with main web sites that assist it. Nevertheless, you must nonetheless watch the browser URL bar to make sure that web sites you present delicate data to show a blue or inexperienced URL bar button.
Don’t open paperwork downloaded via Tor whereas on-line
The Tor Browser will warn you earlier than robotically opening paperwork which can be dealt with by exterior functions. DO NOT IGNORE THIS WARNING. Try to be very cautious when downloading paperwork by way of Tor (particularly DOC and PDF information). These paperwork can include Web assets that can be downloaded outdoors of Tor by the appliance that opens them. This may reveal your non-Tor IP handle.
Use bridges and/or discover firm
Tor tries to stop attackers from studying what vacation spot web sites you hook up with. Nevertheless, by default, it doesn’t forestall any person watching your Web site visitors from studying that you simply’re utilizing Tor. If this issues to you, you may cut back this danger by configuring Tor to make use of a Tor bridge relay reasonably than connecting on to the general public Tor community.
Homepage – https://www.torproject.org
Size: 47.3 MB