Tor Browser is a free net shopping software program and an open community. It helps you defend in opposition to visitors evaluation, a type of community surveillance that threatens private freedom and privateness, confidential enterprise actions and relationships, and state safety.
Tor Browser protects you by bouncing your communications around a distributed community of relays run by volunteers all over the world.
It prevents any individual watching your Internet connection from studying what websites you go to. Also, it prevents the websites you go to from studying your bodily location. And it allows you to enter the blocked websites.
The Browser allows you to use Tor on Windows, macOS, or Linux while not having to put in any software program. It can run off a USB flash drive, comes with a pre-configured net browser to guard your anonymity, and is self-contained (moveable).
Don’t Torrent over Tor Browser
Torrent file-sharing purposes have been noticed to disregard proxy settings and make direct connections even when they’re advised to make use of Tor. Even in case, your torrent utility connects solely via Tor, you’ll usually ship out your actual IP handle within the tracker GET request, as a result of that’s how torrents work. Not solely do you deanonymize your torrent visitors and your different simultaneous Tor net visitors this manner, however, you additionally decelerate your entire Tor community for everybody else.
Don’t allow or set up browser plugins
The Browser will block browser plugins equivalent to Flash, RealPlayer, Quicktime, and others: they are often manipulated into revealing your IP handle. Similarly, don’t set up further add-ons or plugins into the Tor Browser, as these might bypass Tor or in any other case hurt your anonymity and privateness.
Use HTTPS variations of internet sites
Tor will encrypt your visitors to and inside the Tor community, however, the encryption of your visitors to the ultimate vacation spot website relies upon that website. To assist in guaranteeing personal encryption to websites, the browser consists of HTTPS Everywhere to pressure the usage of HTTPS encryption with main websites that assist it. However, you must nonetheless watch the browser URL bar to make sure that websites you present delicate info show a blue or inexperienced URL bar button.
Don’t open paperwork downloaded via Tor whereas on-line
The Tor Browser will warn you earlier than robotically opening paperwork which can be dealt with for exterior purposes. DO NOT IGNORE THIS WARNING. You ought to be very cautious when downloading paperwork through Tor (particularly DOC and PDF information). This paperwork can include Internet sources that shall be downloaded outdoors of Tor by the application that opens them. This will reveal your non-Tor IP handle.
Use bridges and/or discover a company
Tor Browser tries to stop attackers from learning what destination websites you connect to. However, by default, it doesn’t stop anyone watching your Internet visitors from learning that you just using Tor Browser. If this issues to you, you possibly can reduce this threat by configuring Tor to use a Tor bridge relay somewhat than connecting on to the general public Tor network.
Supported Operating Systems:
- Windows 7, 8, 8.1, 10 (32-bit, 64-bit)
- macOS 10.9 and later.
- Linux, BSD, and Unix
Size: 69.2 MB