Closed tor network. How to work with the Tor browser - we block the determination of our location when surfing the net. Installation and setup

The issue of anonymity on the Internet has always been acute for users of a personal computer. In order to protect confidential data as much as possible, people installed operating systems on their PCs. Linux systems or used amateur Windows builds, in which the ability to be tracked has been removed.

With the spread Android smartphones, more and more people began to visit their favorite sites using mobile devices. Unfortunately, in terms of privacy, Android users are much more vulnerable to personal data leakage. Not only is Google freely in possession of the user's personal information, phone number, place of residence, etc. Another scary thing is that since the phone transmits such information, it can always be intercepted by another application. As a result, personal data of a person can fall into the hands of intruders.

Easy Ways to Increase Your Privacy

Unfortunately, any increase in privacy comes with inconvenience. For example, when , you can not connect Google account, but at the same time, the user is deprived of the opportunity to synchronize contacts from the address book, bookmarks in the browser, and much more. In addition, a person can completely remove Google services.

The most reliable way to secure the device is flashing. On any popular smartphone, you can find dozens of amateur firmware on the Internet in which any tracking tools are removed. At the same time, a person should still handle the device carefully, without turning it on again. GPS navigator and access to geodata via an Internet connection (especially accurately determines the location via Wi-Fi).

Installing Tor on Android

If a person does not use setup files have to download from third party resources. In the event that an account exists, the user should log in Play Market, enter the word "Tor" and "Orfox" in the search bar. The search will display Orfox: Tor Browser and Orbot Proxy, both applications must be installed.

As in the desktop version, the program is divided into a browser and a client, with which the program connects to the Tor network. Only in the PC version they are combined - together with the browser, the client also starts. In general, the applications have many similarities, like the PC version, the mobile browser is based on Mozilla Firefox.

First you need to launch the Orbot client, then press the “Start” button in the lower left corner and wait for the connection to the Tor network.

Unlike the usual VPN connections, Tor has several servers around the world at once, the transmitted information between which is encrypted. For example, the data requested by the user passes in encrypted form, first through one server in Europe, after which it is sent to another server through the United States, and then a third in Asia. Unfortunately, the increased reliability of the connection negatively affects the speed of the connection. Sometimes the requested page can take more than ten seconds to load.

After connecting to the network, you can open the notification shade and view the speed and countries through which the requested data passes.

When swiping from left to right, an additional menu opens in which you can select the country that will be determined (the last server from the route).

In addition, in this menu you can enable VPN mode for all applications on the phone, however, given function does not guarantee anonymity in other programs. If a person turns off the function " VPN mode' and enter Chrome browser, his data will be an easy target for attackers.

In fact, the Tor client is configured, now you can minimize it and launch the Orfox browser. On the home page the most frequently visited resources are located, the other two tabs contain bookmarks and history. The default search engine is the duckduckgo anonymous search engine. This search system Positions itself as a confidential system that does not collect data about requests, and also does not display thematic ads.

Already now you can visit various resources, remaining anonymous. If you enter " my ip”, you can see that the user data is being replaced. Specify a different IP address, provider and country of the user.

The main purpose of the Tor browser

One way or another, the main purpose of Tor is not only in the anonymous use of available public access resources. For the Tor network, there is a huge database of resources that can be accessed exclusively using this browser.

Sites designed for Tor consist of a set of numbers and Latin letters, and the address ends with the onion domain. Sites on the onion domain have perhaps maximum protection confidential data, because unlike other resources, the location of the site servers is unknown to anyone except the site owner. About the relevance of the Tor network, says at least the fact that the onion domain has a “mirror” of the most popular social network in the world, Facebook.

Besides, in Lately Increasingly, resources are faced with the problem of blocking, as a result, almost every popular peer-to-peer network has a "mirror" in the Tor network.

Summing up, it can be noted that at the moment, Tor is one of the few tools that offer reliable confidentiality of personal data. Of course, one application is not enough, a person must use it competently. For example, never use old accounts created from a physical IP address on the Tor network, otherwise all privacy will not be worth a penny.

Hello guys Today I will show you how to install the Tor browser and show you how to use it, although what you can do there, everything is simple. So a little incoming information, so to speak. What is Tor? This is an anonymous network so that you can watch sites, communicate, but at the same time so that no one can understand where you are from. Well, that is, you will be anonymous.

Tor in general is such a network, really serious in its structure, the data inside it is all encrypted and transmitted through several servers (they are called nodes). Everywhere on the Internet they write that Tor is slow, but I can’t say anything here, for some reason I have it normal, not super-fast, but not a turtle

By the way, at first I have a picture showing an onion, do you know why? because Tor network this is how it works, according to the onion principle, there is even such a thing as onion routing. Three servers are used to transfer data, which ones can be found in the Tor browser (this is called a server chain type). Well, the traffic from you is encrypted three times, and each server can remove only one protection. That is, the third server removes the last protection.

I’ll also write this, there are such people, well, not quite normal, in short, you know what they do? I've written that the traffic is encrypted and transmitted through three servers. And already on the third server, it is decrypted and becomes available to the recipient, figuratively speaking. Well, not quite normal people set up such a server, so to speak, they raise the node and comb the traffic that goes through it. For this node will definitely be the last one for someone. Well, do you understand what happens? The node is the last one, the traffic is already completely decrypted on it and it can be scanned, well, comb it for your own purposes, so to speak. Therefore, I do not advise you to enter your login and password somewhere in the Tor browser, well, there, for example, on VKontakte or in others in social networks, because in theory you can just be stupidly hacked

Okay, enough talking, let's get down to business. How to install Tor browser on a computer? Spakuha, everything is simple here. So you first need to go to this site:

There you need to click on the purple Download button, this button is:



Just keep in mind that it is better to download only the stable version (Stable Tor Browser), in principle, they go first. Just then there are experimental versions (Experimental Tor Browser), in which there may be errors, I do not advise downloading such a version

Everything, then the Tor browser installer will start downloading. By the way, the browser itself is made on the basis of Mozilla, which is good, because Mozilla does not eat a lot of operatives, it works fast and all that. The Tor browser installer has been downloaded, run it:


It was I who downloaded it in Chrome, in another browser something similar will be. Then you will see a security window, well, there is some kind of warning, in short, click here Run:


By the way, you may not have this window. So, next you will have a choice of language and Russian (Russian) should already be selected there:

Then there will be a window where it will be written exactly where the browser will be installed, so I want it to be placed on the desktop, well, so be it. If everything suits you here, then click Install (well, or click the Browse button to select a different installation folder):


Everything, then the installation will begin, it will pass quickly:


At the end of the installation, you will have two checkboxes:


The first one, I think, is understandable, and the second one is to add Tor browser shortcuts to the start menu and to the desktop. If shortcuts are needed, then do not uncheck the box. In general, we click ready and if you did not uncheck the first checkbox, then the Tor network settings window will start immediately, here is the window:


Well, from this place, so to speak, let's talk in detail. So what do we see in this window? There is a Connect button, there is a Configure button. The Connect button, this will use the usual settings, that is, you can not bathe, but take and press the Connect button and wait a bit. The second button is already to configure Tor and now I will press it to show you what settings are. So I clicked it and this window appeared:


What do we see here? And what we see here is that they ask us if our provider blocks Tor? There are such unusual providers that have nothing to do and they block Tor, there are those that even cut the speed of torrents, such pies. I'll choose Yes here, to show you again additional settings, this is the window that then opened:


What do we see here? And we see some bridges here, and what kind of bridges are they? These bridges, so to speak, are the servers through which Tor will work, that is, it is from these servers that Tor will enter its network. But such a server, that is, a bridge, it can be only one, you can choose only its type. This works very well, but the speed may or may not be lower, it also depends on what type of bridge you choose. In general, these bridges, well, that is, servers, they are called repeaters. You can also manually enter them, first received on the Tor website, I don’t remember exactly what the site is called, but I don’t see much point in this if the Tor browser setting itself can do it. In general, I didn’t touch anything here, I didn’t change the transport, I click Next . Then there will be a window like this:


Here we are asked, how do we go to the Internet, through a proxy or not? Well, what can I say here, here you need to specify a proxy if Internet access goes through it. But damn it, you can just specify the left proxy (the main thing is to have a working one), in order to increase your anonymity, so to speak! In general, I will choose Yes here to show you the window where the proxy is entered, here it is:


But I won’t enter a proxy, I don’t have it stupidly, but it’s working and free, then I’m too lazy to look, it’s not so easy to find such a proxy. So I pressed the Back button, and then I chose No and pressed the Connect button. The process of connecting to the anonymous Tor network has begun:


If everything turned out fine, there are no jokes and jambs, then the Tor browser itself will open, this is how it looks like:


Well, all the guys, I congratulate you, the main thing you have done, that is, you have installed the Tor browser and I hope that it will also just work for you as well as for me! Or didn't work? Well guys, it means something went wrong, I don’t know what exactly, but I personally didn’t find jambs in the Tor browser. No, I'm not saying that you have crooked hands, it's just that it's probably an antivirus or a firewall, so check this moment.

So, the Tor browser has opened, it will load start page. First, you can click on the Open security settings button (although I don’t know if you will have such a button, I got it immediately after starting the browser):


You will see the Privacy and Security Settings window:


Well, I don’t advise changing anything here, except that you can turn the slider up for better anonymity, but to be honest, I didn’t touch it. This window can also be opened by clicking on this triangle:


As you can see, there are other useful items in this menu. So there is such a thing as a New Personality, what is it? Do you know what it is? This is just to restart the Tor browser, that is, it will close and then automatically open. In this case, the IP address in the Tor browser will change. The second point is the New Tor chain for this site, this is to change the IP address in the browser itself without closing it (if I understand correctly). At first I thought it was to change the IP address for the current open tab, that is, the site, after all, it is written there for this site, but I checked it and realized that it was not, this is changing the Tor chain for the entire browser, along with all the tabs. The third point is that you already know what it is. The fourth item, that is, the Tor network settings, then there you can change the relay, set the proxy and specify the allowed ports. I opened the network settings and put two checkmarks there (a little lower) so that you can see all the options, so to speak, here, look:


Well, the fifth point is just checking for updates, by the way, I advise you not to ignore them

Another thing I advise you to do, not often, but you know, well, to check the Tor browser. So you launched it, right? Well, the start page will open, you click on it Check Tor network settings:


After that, you should see a page like this with congratulations:


If you saw her, then everything is just super, you guys are all in a bunch

By the way, after such a check, if you press that triangle again, well, opposite the button with the bow icon, you will see through which countries the current Tor chain works:


All these countries (that is, servers) seem to change regularly, but if you need to change right now, you can click New Personality, well, in principle, I already wrote about this above

True, the only thing I did not understand is whether the repeater belongs to the servers? Well, that is, I mean that the Tor network has three servers, does the relay also apply to them? That is, I created a connection through a relay and I see that it goes like this: relay> server 1> server 2, but I don’t see the third one. So the repeater is included in the total number of servers, so to speak, in the top three? So I disabled the relay, clicked New Identity, the browser restarted, then I clicked Check Tor network settings and this is what I saw:


That is, as I thought, if you turn on the repeater, then it will play the role of the first server, so to speak

So, what else do I want to tell you. So, when you clicked on Check the Tor network settings, well, it will say there that everything is okay, everything is in a bundle, and so there will still be something below that they say you can see the information about the output node (server) and for this you need to click on Atlas:


What is it all about? Well, here you can find out the country of the node, it seems that you can also find out the speed of the server .. In general, such info, so to speak, is not very interesting, but still .. In general, this is what page you will open if you click on Atlas:


Well, have you more or less figured out how to use the Tor browser? That is, it is a regular browser, but which accesses the Internet only through the Tor network. The settings of the Tor network itself are conveniently made, everything is clear enough, I personally didn’t have any errors, the network works like it’s not the slowest Mobile Internet, well, this is me in terms of speed

By the way, I went to the 2ip website, and this is the information he gave me about my IP address:


Well, that is, as you can see, there are no problems with changing the IP address, and where Proxy is written, it also says that the proxy is not used. But do not rush to rejoice! Even 2ip in most cases determines that the IP address belongs to the Tor network .. You just need to click on clarify in front of the Proxy ..

So, what else do I want to say. So the Tor browser runs under such processes as tor.exe (so to speak, the main module for accessing the Tor network), obfs4proxy.exe (if I'm not mistaken, it is responsible for the operation of the relay) and firefox.exe (modified Mozilla to work with the network Tor). All components are in the Browser folder along with Mozilla itself. By the way, the Tor browser does not conflict with the usual Mozilla, well, suddenly you have it installed.

In general, I think that I should tell you what the Tor browser really is, that is, how it works. So look, in fact, everything is a little simpler. The Tor browser itself, then you already understood that this is Mozilla, well, this is a redesigned Mozilla, in which any leaks of your real IP address are excluded. Well, that is, the security is set up strongly, there are also special extensions (by the way, I don’t advise touching them at all). But it still remains the usual Mozilla. The most important thing is tor.exe, this is the file that enters the Tor network. When Mozilla launches it, it raises, so to speak, a proxy server to which Mozilla connects and then can go to the Internet. This proxy server can be used by other programs, but for it to work, the Tor browser must be running, this is important. This proxy, by the way, is the SOCKS proxy type. In general, here is this proxy:

That is, it can even be set in the browser Internet Explorer and he will also go to the Internet through Tor. How to ask? Well, it's very simple, you go to the Control Panel, there you find the Internet Options icon, launch it, then go to the Connections tab and click the Network Settings button there. Then check the Use a proxy server checkbox, then click the Advanced button and specify the proxy in the Socks field:

But it may be that you will need in the Properties: Internet window (well, when you clicked on the Internet Options icon in the Control Panel), click not on the Network Settings button, but simply click on Settings (located above), it will be active if you have you have a connection in the Dial-up and VPN setup box! To be honest, I don’t remember what type of Internet it is, it hasn’t been like this for a long time, but I only know that this type of Internet exists. Well, guys, I think you'll figure it out

Everything, after such actions, well, what I wrote above, then after that Internet Explorer will already work for you through anonymous network Tor. Do you think everything is so simple? No guys! I don't recommend doing this, because Internet Explorer is a regular browser that is not designed for anonymous work in the way the Tor browser is. Do you understand? I just told you all this as an example. This SOCKS proxy is suitable for many programs, not only for Internet Explorer. Well, that's all to say to you on a note

If you are interested, you can see what extensions are in the Tor browser, for this you need to go to this address:

Well, here are all installed extensions:


You can press the Settings buttons to see the settings themselves, but I advise you to change something only if you are sure of it! In general, as you can see, the Tor browser, well, that is, this Mozilla, it is well modified and contains just a bunch of mechanisms to ensure the maximum level of anonymity. Guys, this is goodness.

So what else do I want to say. You can download in the Tor browser, the speed can be low or high enough, as for the Tor network, but here you need to play with the servers, some may be faster, some slow, the same applies. Just when you start the browser is constantly a new server. To be honest, I don’t know if the repeater affects the speed, but if logically, it seems to affect, well, I don’t know, but it seems that my speed was lower on one repeater, higher on the other .. Well, it seems so ... Or is it just a coincidence … I do not know for sure..

Once again I will say that if anonymity is important to you, then just do not change anything in the network Tor settings, nor in the browser itself!

When you start the Tor browser, you will have this small window:


There you can click the Open settings button and configure the connection to the Tor network, well, it means the relay and proxy settings. By the way, if you choose a repeater, then I advise you to choose exactly obfs4, in principle, as advised by default. Although, you can get into all these settings already with the Tor browser running, it will be enough just to click on the triangle next to the onion icon:


Well guys, everything seems to be? I just don't know if I wrote everything, but it seems to be everything. There is nothing difficult in mastering the Tor browser, I think there will be no problems with the settings either, it is easy to use, it works stably without glitches and jambs. Well, personally, I didn’t have such a thing that he wouldn’t work here. And by the way, I don’t know why they say about him that he’s terribly slow, I certainly don’t have a reactive one, but you can still use it

I don't know if you need it or not, if it's interesting or not, but I'll write it. Do you know how to change the country in Tor? Well, maybe you know, maybe not, but it’s not so easy to do this in the Tor browser, because there is no built-in such possibility (in old version seems to have been). You need to manually edit the torrc config file. In general, I will write how to do this, I think that everything will work out for you, I personally checked it myself, yes, yes, it is POSSIBLE to change the country, but with a joke ..

I almost forgot the most important thing to write to you, before editing the torrc file, you need to close the Tor browser! The cool thing is that new setting, well, which we will bring in, then he can bring down. And then, when you already launch the browser with the selected country, then you don’t need to configure anything in terms of the Tor network, otherwise the setting that you manually set, it may go wrong!

So what needs to be done to change the country in the Tor browser? So, first you need to open the torrc file, I don’t know where you will have the Tor browser installed, but I have it installed on my desktop, so the path to the torrc file is here:

C:\Users\VirtMachine\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor


There is the word VirtMachine in the path, it's just the name of the computer, well, that is account. You may have it elsewhere, but in any case, the main thing is the internal path, so to speak, I’ll write again, here it is:

\Tor Browser\Browser\TorBrowser\Data\Tor

That Tor folder contains the torrc. So, okay, got it figured out. Now you need to open it, double-click on it, there will be a program selection dialog, there you need to select Notepad and click OK:


The following file will open:


This file already has the settings that I set. Well, that is, here are the settings that are set in the Tor network settings window where the relay and proxy are selected. See the lines that start with Bridge obfs4? Well, these are the repeater teams, so to speak. After all, the torrc file is a settings file for the Tor network itself, and this file is needed for the tor.exe module, do you understand? Well, there below, if you still twist the mouse, it will be like this:

This also applies to repeaters, 1 is to use them, and 0 is not to use, everything is logical. These are commands, I hope this is sorted out. So what should be done now? And now you need to add a command that will set the country of the destination server (or destination node). Roughly speaking, to change the country, you need to add this command to the end of the file:

ExitNodes (country code)

Where the country code is, then there you need to specify the country, well, for example RU, BY, UA, and so on. Honestly, I don’t know all these codes, but if you really need it, then you can search for this information on the Internet, I don’t think this is a problem. In general, for example, I will set RU, that is, Russia, here is what command you need to write in this case:

We write it at the end of the file:


Then close the file and save the changes. Well, do you understand a little? Then you launch the Tor browser and you will already be permanently in the country whose code you specified in the command. But the problem is that when you start the Tor browser, it will pick up the command with the country code and everything will work fine, but the command WILL NOT be in the torrc file itself, it will DISAPPEAR. Therefore, next time you will have to manually set the command again, such a gembel! I forgot something and did not write that you can specify not one country, but several, for example:

ExitNodes (RU), (UA), (BY)

In this case, the IP addresses of the specified countries will be used as outgoing servers. But there is another command, it is the opposite of this one, on the contrary, it prohibits the IP addresses of the specified countries. Here is the command:

ExcludeExitNodes

As you can see, I have banned outgoing servers from having Russian IPs. Here, too, you can specify several countries separated by commas. And also add to the file.

In general, these are the things guys, it's a pity that the commands from the torrc file disappear after they were picked up by the Tor browser. This is all because such commands are not part of the Tor browser functionality! But I don't think it's such a terrible thing. Although the joint is so joint

But in general, you can somehow fool around with this Tor browser and with the torrc file, maybe you will find some more working way, well, so that the commands are not deleted. You can make a copy of a file like ..

In general, there are a lot of commands for the torrc configuration file, but it's not always easy to deal with them. In general, guys, here's a link with the teams (this is the official site):

Well, there is a lot of useful information, interesting commands, in general, if you are interested, then be sure to take a look

Personally, I advise you to use the Tor browser only with relays, because there is not much difference, what with them, what without, well, I'm in terms of speed, but relays, so to speak, increase anonymity. Here is such a moment.

And I want to write something else, just not everyone knows about it. Tor servers are not only those who specifically do this, that is, specially created servers to support the Tor network, but also ordinary users. I don't know exactly how they do it, so I won't say anything. But what do they do it for, what do you think? They do it in order to scan traffic! If the server is the last, then after it the traffic is not encrypted, which means you can view it! Thus, they try to find out logins and passwords from everything that is possible. But it’s true, well, there don’t seem to be many such servers, but it’s better not to take risks and not go anywhere in the Tor browser, that is, do not enter a username and password. This is just my advice guys.

In general, what can I say, well, so to say, what conclusion can be drawn? I'll try to be brief. The Tor browser is cool, at one time I got the idea to use the Internet only through Tor, I even managed to download movies through it, but damn it, it’s still slow compared to the regular Internet. Yes, and it is not safe to use your personal mail through it, go to some sites there, well, in principle, I already wrote about this. So in short, that's the way things are guys.

Well, the guys are on it and that's it, it seems that I wrote everything, or not everything, but I tried to write as much information as possible, just already tired of Malech. If something is wrong, then I'm sorry, but I hope that everything is so and that everything is clear to you here. Good luck in life and that everything is fine with you.

08.12.2016

We have told you how to use a VPN in your daily work.

Today I want to tell you in detail about the distributed anonymous Tor network.

Recently, in Runet, with the advent of state regulators and tightening their position against ordinary network users, (see our articles on state regulation of the Internet: and) there has been a discussion about the fate of the Tor network and other anonymizing services.

News has already appeared in the press about the “ban on Tor” at the suggestion of the Russian security forces:

The Public Council under the FSB of Russia considers it necessary to improve the legal regulation of the activities of legal and individuals distributing information on the Internet. In connection with this advice, proposals were made to legislators on the need to ban the use of anonymizers - programs that mask information data and the IP address of users.

The fact is that if, by a court decision, access of Internet users to a certain site is blocked, the latter, with the help of anonymizers, will be able to visit the pages of the blocked site. For example, with the help of these programs, users in China and Belarus very safely access those sites to which local authorities block access.

The initiative of the security forces implies a ban software or browsers with a built-in anonymizer (such as the Tor browser). In addition, the masking tools include web servers - stand-alone sites, through which users can, without establishing special programs go with a changed IP address to a blocked site.

Similar amendments will be made to the federal law"About the information information technology and on the protection of information.

However, the position of state regulators on this matter has not yet been finally determined:

The Public Council under the FSB of Russia denied reports of the development of recommendations restricting freedom on the Internet. This was reported on June 5 by TASS-Telecom.

The Council explained that at the meeting on the issue of Internet security, a variety of views were expressed, but no specific solutions concerning restrictions on the Internet was not adopted.

The council, the statement said, "has never made such a proposal, made such a statement, or made any recommendation to the legislature."

Why is it needed distributed network Tor to an ordinary Internet user? It would seem that any law-abiding citizen should ask himself: “And why exactly should I hide (anonymize) my identity on the Internet? I'm not going to do anything criminal, hack sites, for example, or distribute malware, or steal other people's passwords? In principle, we in our articles, as well as in articles: and have already given an answer to this question.

But I would also like to give a very interesting opinion of one of the Tor free software developers, which he covered in his interview ( The developer of the network anonymity service told why you need to hide your data on the Internet):

Why is anonymity needed at all for ordinary Internet users, those who are supposed to have nothing to hide?

The problem is that "nothing to hide" is not at all the same as the complete control of all user activity on the Web by state bodies, which employ the most ordinary fools, guided by the laws crookedly written by other fools. If such fools do not like something, they will have to spend their health, time and money in order to prove their innocence, and with an unguaranteed result. Why take risks when you can use a simple technical tool supported by other - this time smart - people?

In addition, along with anonymity, we also get resistance to network censorship at the state level. Why should an ordinary citizen think about what site Deputy Pupkin will ban today? This is not Pupkin's business, especially if Pupkin never finds out where the citizen went today on his network business. The citizen does not climb into Pupkin's personal life.

So, we think that our reader has already received exhaustive answers to the question “why should he use Tor”.

Well, now, it's time to move on to purely practical questions, how the Tor network works and how to install and configure it on your computer.

1. How Tor works

Tor is a network of virtual tunnels that allows you to better protect your privacy and your security on the Internet. It works like this: Tor connects your computer to the Internet not directly, but through a chain of three randomly selected computers (so-called relays) that belong to the Tor network.

Everything you send to the Internet through Tor becomes, firstly, anonymous (hidden source) , and secondly, remains encrypted all the way between your computer and the last relay . But after the data leaves the last relay and is sent to its destination internet address - it goes no longer encrypted, but in the usual, open form.

If you are transferring particularly sensitive data - for example, entering a username and password to enter a website - make sure that the HTTPS protocol is working (i.e. the address bar says, for example, https://torproject.org/ and not http://torproject.org/).

2. How to download and install Tor

Various distributions of the Tor package can be downloaded from the project's website.

Read more about the settings of this version in our article:

If you yourself want to take part in the Tor project, then you should read about setting up Relay https://www.torproject.org/docs/tor-doc-relay.html.en

If for some reason your ISP (or system administrator) has blocked access to the Tor network project site, then the Tor distribution kit can be requested by e-mail (the request must be made from a gmail box):

to receive the Tor Browser English Pack for Windows, send an email to [email protected] with the word windows in the message body. You can leave the "Subject" field blank.

Similarly, you can request the Tor Browser Package for Mac OS ( having written macos-i386), and for Linux (by writing linux-i386 for 32-bit systems, or linux-x86_64 for 64-bit systems)

If you need a translated version of Tor, please email help. You will receive a response email with instructions and a list of available languages.

4. If you have already installed Tor and it does not work for you, then this may be due to the following reasons:

If a regular internet connection works but Tor cannot connect to the network, try the following: open control panel Vidalia, Press Message log and select the tab Advanced settings. It is possible that Tor is not connecting to the network because:

a) Your system clock is disabled: Make sure the date and time on your computer are correct and restart Tor. You may need to synchronize the system clock with the server.

b) You are behind a firewall: To tell Tor to only use ports 80 and 443, open Vidalia control panel, click Settings and Networks "My firewall only allows me to connect to certain ports."

c) your antivirus program blocks Tor: Make sure your antivirus program is not preventing Tor from connecting to the network.

d) If Tor still doesn't work, it's likely that your ISP is blocking Tor. Very often this can be bypassed with Tor bridges - hidden relays which are not so easy to block.

If you need to find out why Tor cannot connect, send an email to the developers at e-mail [email protected] with the relevant information from the log log.

How to find the bridge

To use a bridge, you must first discover it; this can be done at bridges.torproject.org , or you can send an email to [email protected]. If you sent a letter, please make sure you write get bridges in the body of the letter. Without this, you will not receive a response. Please note that you need to send this email from either gmail.com or yahoo.com.

Setting up multiple bridges will make your Tor connection more stable in case some of the bridges become unavailable. There is no guarantee that a bridge used today will work tomorrow, so you must keep the list of bridges up to date.

How to use the bridge

If you can use multiple bridges, open Vidalia control panel, click Settings, then networks and check the box where it says "My ISP is blocking connection to the Tor network". Enter the list of bridges in the box below, click OK, and restart Tor.

How to use open proxy

If using a bridge doesn't work, try configuring Tor to use an HTTPS or SOCKS proxy to access the Tor network. This means that even if Tor is blocked in your local network, you can safely use open proxies to connect to the Tor network and to the censorship-free Internet.

For the following steps, you must have functional Tor/Vidalia configurations, and a list of HTTPS, SOCKS4 or SOCKS5 proxies.

Open Vidalia control panel and press Settings.

Click networks. Select "I am using a proxy to access the Internet".

In field The address, enter address open proxy. It can be a proxy name or an IP address.

Enter proxy port.

Generally, you do not need to enter username and password. If you still need such information, then enter it in the appropriate fields.

Select Proxy type, such as HTTP/HTTPS, SOCKS4, or SOCKS5.

Click OK. Vidalia and Tor are now configured to use a proxy to access the rest of the Tor network.

Today, on the Tor project website, you can find many more diverse products for a variety of operating systems (Windows, Linux, Mac OS).

5. Anonymization solution has already been implemented using Tor and for mobile platforms, for example for Android:

Tor for smartphones

You can set up Tor on your Android device by installing a package called Orbot. Help on downloading and installing it is available on the Tor Project Site.

There are experimental packages for Nokia Maemo/N900 and Apple iOS.

6. The Tor Development Team Launched More a number of anonymizing projects and services, for example, Tails is a Live CD/USB distribution preconfigured to use Tor safely, i.e. anonymizing operating system based on Linux, which provides completely secure and anonymous surfing on the web.

You can learn about other products and projects of the Tor network on the page.

Tor also allows clients and servers to provide hidden services. That is, you can provide a web server, SSH server, etc. without exposing your IP address to your users.

Of course, this function is not needed by most ordinary Internet users, but if you are still interested, you can read about it here:

Once the TOR browser was known only to a small circle of advanced users and developers. To date, this system has also gained popularity among lovers of absolutely safe Internet surfing. This is not at all surprising, because recently more and more users are facing difficulties. closed access to internet resources. The car of "Roskomnadzor" functions quite productively, however, unfortunately, from the principle "we cut the forest, the chips fly." Therefore, portals are constantly under blocking, which pose absolutely no danger, but have many useful information that people need. And not every user will like it when it is not he who decides which sites to view, but someone else. From a number of these problems, anonymization methods began to improve and the most comfortable and practical tool for confidential surfing - TOR. Let's let him correct those minor misunderstandings that arise today on the Internet.

Use TOR extremely simple. The most efficient method for confidential access to the network is to download the browser installer from the official portal. The installer will unpack the TOR browser files to the specific folder you specified (the default is the Desktop) and on this, respectively, the entire installation process will be completed. All you have to do is run the program and wait for the connection to the confidential network. Upon successful launch, you will see a welcome page with a notification that the browser has been successfully designed to connect with TOR. WITH this moment, You will be able to surf the Internet absolutely without problems, while maintaining confidentiality.

The TOR browser initially contains all the necessary options, so you most likely will not have to change them. You need to pay attention to the plugin "No script". This TOR browser add-on is required to control Java and other scripts hosted on portals. The thing is that certain scripts can be dangerous for a confidential client. In some cases, it is located for the purpose of deanonymizing TOR clients or installing virus files. Remember that by default “NoScript” is enabled for displaying scripts, and if you want to visit a potentially dangerous Internet portal, then do not forget to click on the plugin icon and disable the global display of scripts.

Another method of accessing the Internet privately and using TOR is to download the “The Amnesic Incognito Live System” distribution package. The System is included, which has many nuances that provide the highest protection for confidential clients. All outgoing connections are sent to TOR, while normal connections are blocked. Moreover, after applying TAILS on the personal computer there will be no information about your actions. The TAILS distribution kit includes not only a separate TOR browser with all the necessary additions and modifications, but also other functional programs, for example, a password manager, cipher applications and an i2p client for accessing “DarkInternet”.

TOR can be used not only to view Internet portals, but also to access sites hosted in the .onion pseudo-domain area. In the process of viewing *.onion, the client will receive even greater confidentiality and reliable security. Addresses of *.onion portals can be found in a search engine or in separate directories. Links to the main *.onion portals can be found on Wikipedia.