What is Tor?

Tor (The Onion Router) is free, open-source software that enables anonymous communication. It directs internet traffic through a worldwide volunteer network of relays, concealing your location and usage from surveillance and traffic analysis.

How Tor Works

Your traffic is encrypted and routed through at least 3 relays before reaching its destination. Each relay only knows the previous and next hop, not the complete path. This makes it extremely difficult to trace traffic back to you.

Downloading Tor Browser

⚠️
Only Download from Official Source

Only download Tor Browser from torproject.org. Never use third-party downloads—they may contain malware or backdoors.

  1. Visit https://www.torproject.org in your regular browser
  2. Click "Download Tor Browser"
  3. Select your operating system (Windows, macOS, Linux)
  4. Save the installer to your computer
  5. (Optional but recommended) Verify the signature

Installation by Platform

🪟 Windows

  1. Run the downloaded .exe installer
  2. Choose installation language
  3. Select installation location (default is fine)
  4. Click Install and wait for completion
  5. Launch Tor Browser from the desktop shortcut

🍎 macOS

  1. Open the downloaded .dmg file
  2. Drag Tor Browser to Applications folder
  3. Right-click and select "Open" (first time only)
  4. Click "Open" in the security dialog

🐧 Linux

Terminal Commands
# Extract the archive
tar -xvf tor-browser-linux64-*.tar.xz

# Navigate to directory
cd tor-browser/

# Launch
./start-tor-browser.desktop

First-Time Configuration

  1. Launch Tor Browser
  2. On the connection screen, click "Connect" for most users
  3. If Tor is blocked in your country, click "Configure" to set up bridges
  4. Wait for Tor to establish a connection (may take 30 seconds)
  5. You'll see the Tor Browser homepage when connected

Using Bridges (If Tor is Blocked)

Bridges are unlisted Tor relays that help you connect when Tor is censored.

  1. On the connection screen, click "Configure"
  2. Enable "Use a bridge"
  3. Select "Use a built-in bridge" → obfs4 (recommended)
  4. Or request bridges from bridges.torproject.org
  5. Click "Connect"

Security Settings

Tor Browser has three security levels. Access via the shield icon in the toolbar:

Standard

All features enabled. Best compatibility but least secure.

Safer

JavaScript disabled on non-HTTPS sites. Good balance.

Safest ✓

JavaScript fully disabled. Recommended for darknet use.

Important Don'ts

  • Don't maximize the window - Screen size can be fingerprinted
  • Don't install additional extensions - They can compromise anonymity
  • Don't open downloaded files while online - They may reveal your IP
  • Don't use Tor for regular browsing - Logging into personal accounts links identities
  • Don't torrent over Tor - It's not designed for that and reveals IP