How to set up smartphones and PCs. Informational portal

What is tor browser. Using open proxy

If you're tired of the feeling of prying eyes following you to sell something, then it's time for you to find out what the Tor browser is.

Personal information left by the user in social networks, online stores, websites government organizations and just in search engines, very much interests first of all the same search companies. They process user preferences in order to improve their algorithms and improve the quality of search results.

In addition, there are hungry attackers prowling the depths of the Internet who want to gain access to your data. bank cards and electronic wallets.

Marketers also contribute to tracking your movements on the network: it is very important for them to find out what you can sell based on the queries that you continue to drive into search engines. One has only to enter your mailbox, and there are already very important offers to go there and buy something, having previously studied at such and such courses, not free, of course.

One can only assume, but, most likely, the special services are also interested in your information, at least from the position total control for the population, of course, for the sake of national security. After summarizing all of the above, a natural desire arises to avoid such dense attention surrounding simple user Internet networks. And this is precisely the opportunity that the Tor browser can provide you with.

The Onion Router

So what is tor? TOR browser is free and open source software, whose name is an acronym for The Onion Router, and in Russian: onion router, or onion router. The name of the browser reflects the basic principles on which its encryption system is built, written in the programming languages ​​Python, C and C ++. In general, the system is a network of proxy servers that establish an anonymous connection in the form of a virtual tunnel, in which it is impossible to calculate the user's location, since the data transfer is encrypted.

Through the use of an extensive system of servers, or information nodes, this browser allows the user to remain anonymous, invisible to all potential scammers, robbers, spies and other users with reduced social responsibility. With it, you can create your own sites without revealing their location, and you can also contact those sites that are blocked by official censorship.

Mike Perry, one of the developers of Tor, believes that the browser can provide high level protection even from spyware like PRISM.

History of appearance

Tor Browser was primarily created in the US Navy's research lab when US intelligence agencies were working on the Free Heaven project. For some unknown reason, the project was closed, and all the source codes fell into the public network, where they were caught by talented programmers and organized by the Torproject.org community. Here the browser has already been finalized by voluntary developers, although it continues to be improved, developed and updated to this day.

Just a year ago, Tor already had more than 7,000 system nodes installed on all continents of the Earth, excluding Antarctica, and the number of network users exceeded 2 million. According to Tor Metrics statistics, in 2014 Russia joined the top three countries using the Tor browser most actively. Since the browser is an open source system that has been worked on for over 15 years various programmers, you don’t have to worry about the fact that he may be tricked, and instead of protecting information, he will begin to steal it.

Exactly open source browser gives us a guarantee of the security of its use.

Video review of the browser, a bit of history and the main purpose

How the system works

Existing TOR technology allows any user to access any site without leaving any traces behind. That is, on the site where you looked, they will not be able to track the IP address of your computer, which means they will not be able to figure you out. It won't even be available to your ISP. And the browser itself will not store information on your movements on the Internet.

The principle of operation of the onion system can be represented as follows:

1. Communication nodes are formed, installed in different countries advocates of this technology. For data transfer, 3 arbitrary nodes are used, while no one knows which ones. The data transmitted by users is encrypted multiple times, with each level of encryption being the next layer of the onion router packet. Note that only the path or routing is encrypted, not the content itself. information packages. So if you want to secret information reached the addressee in complete safety, additional encryption will be required.

2. At each subsequent node through which the information packet is transmitted, one layer of the cipher is decrypted, containing information about the next waypoint. After reading this information, the used bulb layer is removed.

That is, the browser sends a packet to the first host that contains the encrypted address of the second host. Node 1 knows the key for the cipher and, having received the address of node 2, sends a packet there, which is similar to the fact that the first layer of the husk was removed from the onion. Node #2, having received the packet, holds the key to decrypt the address of node #3—another layer of husk has been removed from the onion. And this is repeated several times. Thus, from the outside it will be impossible to understand which site you ended up opening in your Tor browser window.

Video instruction for installation and configuration

System Disadvantages

Search engines, your ISP, or someone else who is already used to following your surfing the web may guess that you are using Tor. They won't know what you watch or do online, but the very fact that you want to hide something will become known to them. Therefore, it will be necessary to study existing methods enhancing anonymity, if you choose that path.

The Tor system uses simple computers rather than high speed. Another drawback follows from this: the speed of information transfer in this anonymous network may not be enough to view, for example, video or other entertainment content.

Currently, the Tor browser is working and actively developing, using more than 15 languages, including Russian. The latest version of Tor was released on January 23, 2017. In some countries, the Tor Project website is blocked or censored, making it impossible to download the Tor Browser directly. In this case, you can use the mirror: Tor Browser Bundle on Github, if the mirrors are not available, you can try to download it through the Gettor service.

Do not forget to leave your reviews about the browser

Recently, interest in the anonymous network is constantly growing. And there are many reasons for this..

"Democratic reforms" in the world are in full swing. The governments of almost all countries now sincerely believe that they have the right to decide where their citizens go, what to see and what to read. Bundles of laws, "with the best of intentions" stamped by thoughts, councils and parliaments, increasingly sharply define the boundaries of reservations, within which now only the existence of users on the global network is possible.

“You don’t go there, go here. And then the snow will fall on your head - you will be completely dead ”©“ Gentlemen of Fortune ”.

Another tense moment is the incessant revelations of Edward Snowden, from which it is clear that the total surveillance of everyone and everyone by the special services has already acquired a truly worldwide scope. Of course, the vast majority of people have nothing to hide, but it is extremely unpleasant to realize that you are under the constant cap of special forces, your every step is monitored and recorded, and someone regularly tries to pick their naughty little hands in your "dirty linen". And absolutely do not care for what purpose he does it, whether he has good intentions or not.

Why is it needed, this Tor?

More and more people are trying to keep their private lives safe from the long nose of the secret services. More and more people are trying to get rid of the “paternal care” of state officials and want to exercise their constitutional right to independently decide where to go, what to choose, where to look and what to do.

And here the anonymous Tor network comes to the rescue. Since it can provide a significant reduction in obsessive attention to a single individual, simultaneously removing almost all restrictions on movement along World Wide Web. Tor will hide your identity on the Web, hide everything you did on the Internet and where you went.

In addition, the Tor network has another small practical bonus. It quite often allows you to get around such an annoying thing as an IP ban on various sites. A trifle, but nice.

What is Tor and how it works

So, what is the Tor anonymous network. Tor is an abbreviation for The Onion Router (for those who do not know bourgeois, but are curious - see the translation in). If someone is interested in boring technical details let it stomp on Tor page on Wikipedia and understands. I would like a bit simpler - to the same page on Lurkomorye. I will try to quickly explain "on the fingers."

Although this network operates on the basis of the regular Internet, all data in it does not go directly from you to the server and back, as in the "big" network, but everything is run through a long chain of special servers and is encrypted many times at each stage. As a result, the final recipient, that is, you, becomes completely anonymous for the sites - instead of your real address absolutely left IP is displayed, which has nothing to do with you. All your movements become impossible to trace, as well as what you did. And intercepting your traffic also becomes completely useless.

It's in theory. In practice, sometimes not everything is so rosy. But about everyone possible problems we'll talk a little later. You're already tired of the long and boring intro, aren't you? Can't wait to install and try this miracle as soon as possible? Well then, let's go!

Let's start using Tor?

Tor is a rather complicated device in terms of installation and configuration. And in times not so ancient, connecting an ordinary “teapot” to it became a task by no means trivial. However, today everything is much simpler. Smart and kind people took all the necessary modules, put them together in a coherent bunch, set everything up as it should, and stuffed it into a single package. This package is called . And after downloading, all the fuss with it comes down to the usual unpacking and subsequent trampling of the “I want Tor!” button. And Tor appears.

Of course, computer geeks and those who have nothing to do or want to amuse their CSF, as before, can download all the necessary modules separately and gnaw through a multi-page technical “Kama Sutra”, trying to tie it all together, and at least somehow configure and run the resulting structure. We wish them good luck, and we ourselves will do something more rewarding.

I advise on this tab to pay attention to the link " Checking Tor Internet Settings". Clicking on it will help you finally make sure that you are really now in an anonymous network. By the way, there is also a link to a quick guide.

So, you are now invisible. However, until your head is finally spinning from anonymity and imaginary impunity, I hasten to slightly spoil your mood. Just like that, purely out of personal harm.

I just have to tell you about some of the "pitfalls" of the Tor network, so that in search of adventures in your "lower hemispheres" you do not hit them on these stones.

A bit of security in Tor

So, what Tor cannot protect against. Tor cannot protect a person from their own stupidity. If a person has only sawdust instead of brains in the cervical growth, or he purposefully looks for problems for himself, then he will definitely find these problems. And no Tor will help here. Learn to use your brain and exercise basic caution. Tor will also not be able to protect you from chatty programs on your computer. Any plug-in or add-on in the browser can “multiply by zero” all your anonymity at one moment. Yes, the browser...

That is why the package we are considering uses a specially doped version of Ognelis. By the way, does anyone else need to be reminded that Windows itself is one huge Trojan and a spyware? ( Linuxoids can breathe freely here - they never care about such children's problems of “vents”). Tor will also not be able to protect you from viruses and hackers. Well, it's not meant for that! Get yourself a normal antivirus and firewall, set them up correctly and learn how to use them - and sleep peacefully.

The main problems of the Tor anonymous network

Okay, I’m finishing my digression and moving directly to the problems of the Tor network itself. The first thing that catches your eye is the speed. Page loading speed. Although the words "speed" and "rushes" are clearly inappropriate here. Pages load much slower than usual. This is the price of anonymity. The page you requested before getting to your browser, long time dangles between servers around the world. However, it should be recognized that the situation now is much better than a couple of years ago, and it is quite possible to live with such a speed. If you get used to it a little. Despite everything, the network develops and grows stronger.

special services

Another - and perhaps the main - problem of the Tor network is intelligence agencies. They can’t accept the fact that crowds of users roam the network freely and uncontrollably without them. all-seeing eye". And they are constantly making every possible attempt to change the situation. Attempts are very different, up to frankly criminal. Before the viral hacker attacks and hacks, targeted infection of software and servers with Trojans. Although infrequently, sometimes their efforts end successfully for them, And entire segments fall out of the “onion” network, and a “pativen” leaves for one of the most unfortunate (or the most stupid, or the most arrogant). But you're not going to do anything criminal in Tor, are you? This is all to ensure that you do not relax too frankly and constantly remember that Tor is not a panacea, and any anonymity is relative. And if you decide to play gambling with the state, then the question of your capture is only a matter of time.

officials

In addition to intelligence agencies representing the interests of states, state officials often represent a problem for the anonymous Tor network. The desire to “keep and not let go” in people who have seized power is indestructible. Occasionally, in relation to some things, this desire is quite justified and just, but most often it is not. And the bit of freedom given by Tor acts like a red rag on them. In some countries, the Tor network is already banned. Legislatively. There was such an attempt in Russia. So far, only in the draft version. Whether this project will become law and when, I do not know. At the moment, the Tor network in Russia operates without restrictions. Forbid - there will be something else instead of it. I will not lay out here verbatim folk wisdom on this subject, but I will say a little softer and more streamlined: "For every action there is its own opposition."

hackers

Another misfortune for Tor is hackers. Some of them are ideological. and some are simply stoned to *** (sorry for the non-parliamentary expression). Periodically, most often during the spring or autumn exacerbation, they arrange "crusades", trying to "cleanse the world of filth." At the same time, the opinion of the world itself does not bother them at all. They think that they have the right to decide for everyone. Not so long ago, there was a "campaign" against, let's say, non-traditional porn, on the Tor network. The case in this case is quite charitable. However, along with the porn, a bunch of completely white sites were also sawn out. Just like that, in passing. And who said that next time they will be limited to only this? So know that if your favorite "onion" site suddenly stopped opening, then it is quite possible that this is the actions of one of these with inflamed brains.

Infected files

Closely adjacent to hackers is the problem with infected files of the Tor Browser. And here the ears of various special services often peek through, trying to plant their Trojan instead of an anonymous network. For example, in App Store still offer to download the infected Tor Browser. Moreover, the administration of the App Store was informed about this repeatedly in the fall. However, the Trojan is still there. Strange situation and strange slowness. True, all the strangeness disappears instantly when you remember that the tender and quivering friendship between Apple Corporation and the US NSA is getting stronger day by day. So download the files of Tor itself exclusively from the official site, or - our engine, in fact, will also give you a file directly from the official site.

Minor disadvantages of Tor

With an overview of more or less serious problems of the Tor network, it's over. Let's move on to minor annoyances. I have already spoken about periodically disappearing sites. Now about Russian sites in this anonymous network. They are few. But they already exist, and there are more and more of them. And even in many non-speaking forums there are sections for Russians. So where to roam and who to talk to you will find. However, the main language in the Tor network is still English, and all the tastiest things in this network are in bourgeois. Although at your service there are always all kinds of dictionaries and.

Further. It should be remembered that the Tor network is fundamentally not moderated or controlled by anyone. Sometimes some control occurs on individual sites when their owners set rules for their visitors. But not more. Therefore, you may well stumble upon things that shock you. Be ready for it. Also in this network there are various scumbags, frank schizoids, maniacs and other freaks. There are plenty of them in the "big" Internet, but in an anonymous network they feel more comfortable and are not particularly shy. Their percentage is much less than government officials are trying to tell us about this, but they exist. And if you have minor children, I recommend keeping them away from Tor.

And in general, I strongly demand to protect the Internet from children! It will only benefit the Internet. It will make him much safer.

Well, in general, he told all the horror stories. I will only remind you about viruses that Tor will not protect you from - protect yourself. Well, about anonymity again - it never happens one hundred percent, use your gray matter more often.

And for dessert, a small list of "onion" sites, so to speak, for overclocking.

Goodies and bonuses - a small list of "onion" sites

By the way, if you haven’t understood yet, then in Tor Browser you can open both ordinary sites of the “big” Internet, bypassing some inconveniences, and special sites of the anonymous “onion” network. These sites are located in a special pseudo-domain zone .onion(look carefully at the address). From the usual Internet, they do not open. At all. Only from Tor Browser running and connected to the network.

  • Tor Wiki(http://torwikignoueupfm.onion/) - Directory of Tor links.
  • The Hidden Wiki(http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page) is the first site every new user of the Tor network should look at. Contains links to almost all the resources of the "onion" network. Often unavailable due to the huge influx of visitors.
  • The Uncensored Hidden Wiki(http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page) - mirror of The Hidden Wiki. Moderation is minimal.
  • TORDIR(http://dppmfxaacucguzpc.onion/) - a large directory of "onion" sites.
  • Tor Search(http://kbhpodhnfxl3clb4.onion/), Torgle(http://zw3crggtadila2sg.onion/torgle), TORCH(http://xmh57jrzrnw6insl.onion/) and The Abyss(http://nstmo7lvh4l32epo.onion/) - search engines on the Tor network, at least one of them works.
  • Flibusta(http://flibustahezeous3.onion/) - a mirror of the famous library in the onion network (RU language).
  • OnionNet(http://onionnetrtpkrc4f.onion/) - IRC network. The main language of communication is English. Different channels for discussion, up to an illegal immigrant. Additional servers: ftwircdwyhghzw4i.onion, renko743grixe7ob.onion, nissehqau52b5kuo.onion.
  • vTOR"e(http://da36c4h6gxbckn32.onion/) - social network. interest clubs, blogs, forum.
  • RAMP(http://ramp2bombkadwvgz.onion/) is currently the largest trading platform in the Russian segment of the Tor network. Recently, there have been a lot of complaints about the actions of the administration and the increasing cases of scammers. (So ​​don't click your beak and keep your eyes and ears open) With the biggest selection on the web. And the highest prices.
  • RUForum(http://ruforumqewhlrqvi.onion/) - a Russian-language forum with communication and sale of everything that is impossible. Recently closed to outsiders. Registration is paid - $10.
  • Amberoad(http://amberoadychffmyw.onion/) is one of the largest shadow trading platforms.
  • Assassination Market(http://assmkedzgorodn7o.onion/) - betting on guessing the date of death of any bad people. Anyone can add a person to the list or raise the bid for existing positions. At the moment Barack Obama and Ben Bernanke are in the lead.
  • Hack IT(http://tuwrg72tjmay47uv.onion/) - a live service for hiring hackers.
  • Wikileaks(http://zbnnr7qzaxlk5tms.onion/) - I hope I don't need to explain what it is? Mirror in the "onion" network (ENG).
  • Onion Portal(http://ximqy45aat273ha5.onion/) - guide to the "onion" network (RU).
  • http://k4bmdpobhqdguh2y.onion/ - blog about new hidden network services (ENG).
  • Lukochan(http://562tqunvqdece76h.onion/Lukochan/) - large board (ENG, RU).
  • silk road(http://silkroadvb5piz3r.onion) is another large anonymous marketplace (ENG).
  • Keys open doors(http://wdnqg3ehh3hvalpe.onion/) - site about hacking game consoles and all kinds of gadgets (ENG).
  • http://n2wrix623bp7vvdc.onion/hackingservices.html - a resource about hacking social networks, etc. (ENG).

All sorts of political-revolutionary-partisan resources are not cited here intentionally. Whoever needs it will find it.

So, many probably know about the existence of some anonymous Tor network, but do not know what it is and how it works. So, if you want to know more about this, please, ask under cat.

  • Principle of operation
Tor (abbr. from English. T he O nion R outer) is free and open source software for implementing the second generation of the so-called onion routing.

In essence, this is a special proxy server system that allows you to establish a secure, anonymous connection, since all data is transmitted in encrypted form. The system itself, by the way, is written mainly in programming languages. C, C++ And Python.

Traffic anonymization is provided through the use of nodes - an extensive system of servers.

It all works like this: users of the Tor system run a proxy server on their computer, which, in turn, connects to the servers of the Tor network, thus forming a link in a chain that uses a multi-level encryption system.
Visual diagram of how Tor works

Each data packet that enters the system passes through three successive links (proxy server, node) chosen randomly. This packet is encrypted with three keys before being sent. When the first server receives the packet, it decrypts the "upper cipher" (something like an onion peel) and knows where it should send Current Package data. The same happens with the next two links of the chain. As a result, the packet “cleared” of all ciphers reaches its original destination.

  • Spheres of use of Tor
With the help of the system Tor users remain anonymous when visiting websites ( of course, if you log in to any service, this will not make much sense), working with any applications, blogging, etc. Tor system provides significant protection against traffic analysis that compromises privacy confidential information.

The initial page of the Swiftfox browser when connected to the Tor network
For example, journalists use Tor to communicate with anonymous whistleblowers( By the way, with the help of the Tor network, Edward Snowden reported about the PRISM intelligence program to The Washington Post and The Guardian newspapers).

Intelligence agencies also use Tor to ensure proper secrecy when performing special operations. Of course, this is far from all areas of use of this anonymizer.

  • History of Tor
The Tor system was created at the Center for High-Performance computing systems» US Naval Research Laboratory as part of the Free Haven project in conjunction with the US Defense Advanced Research Projects Agency on a federal order. In 2002, the development was covered in wide circles, and the source codes were transferred to independent developers who brought to life client-server application and published it, so to speak, for testers - everyone could check Tor for errors.

Subsequently, the project was supported by the rights organization Electronic Frontier Foundation, she made great efforts to promote and expand the network. At the moment, significant financial assistance is provided by the Department of Defense and the US State Department, as well as the National Science Foundation.


Tor now has approximately 7,000 network nodes, and the number of participants reaches 3 million. Russia ranks third among the countries most frequently using Tor.
  • Facts about Tor
1.Tor is quite easy to use

Probably, many thought that Tor is something complicated, accessible to hackers and computer geniuses. In fact, at the moment, the developers have simplified its use as much as possible - all you need to do is download a browser that supports connecting to the Tor network (note Tor Browser), and when you start it, you will automatically be connected to the Tor network.

2.Tor is not slow

Yes, a couple of years ago, the Tor network was quite slow, but now everything you need is available with sufficient speed. Of course, it’s far for torrents, but in order to lead an active life on the Internet, it will do.

3. Tor is not a panacea

As I wrote above, Tor does not provide anonymity when logging into, for example, Facebook.
You should soberly understand how Tor works and use it competently, for your own benefit.

As a rule, some Internet users, for various reasons, try to ensure their privacy, therefore, they regularly consider the main methods for anonymizing traffic from the Internet, which are available for use by an ordinary user. Basically everyday VPN usage can help solve this problem, but this method may not be convenient for everyone. Therefore, in this article we will talk about TOR - an anonymous distributed network.

So what is the Tor network?

Nowadays, in Runet, with the advent of state control and a tougher position in relation to ordinary users, in question about the future fate of TOR and similar anonymizers. they have long been trying to ban the Tor network, reviews of which are extremely positive. Information about the “ban on TOR” is already appearing in the media at the suggestion of the Russian security forces. Thus, the Izvestia newspaper contains a direct indication that today there is a proposal from the security forces to ban programs that hide users on the network.

The Council of the Public under the FSB of the Russian Federation considers it necessary to legally regulate the activities of legal and individuals in the Internet. Therefore, he formed proposals on the need to ban anonymizers - programs that mask data and an IP address.

If by judgment access to a particular site will be denied to users, users using an anonymizer will still be able to access the site (for example, using a search in the Tor network). For example, users from China and Belarus visit sites that are blocked by local authorities without any problems.

The proposal of the security forces involves a ban on software or browsers that have built-in anonymizers (the Tor Internet network, for example). In addition, web servers are also referred to as masking tools. These are stand-alone sites through which users can switch from a different IP address to. There is also an indication that such amendments will be made to federal law.

To date, the state's position on this matter has not yet been fully determined.

Why is this network needed?

Why is the Tor network needed for an ordinary and ordinary user?
Logically, every citizen who does not break the law should think: “Why should I hide myself on the Internet using an anonymizer? I'm not planning illegal actions - hacking sites, distributing malware, cracking passwords, etc.?” IN general sense This question can be answered as follows: some sites containing content for free download are blocked very quickly and thus become inaccessible to most users. In addition, some employers restrict access to social networks and entertainment sites, and the resources of the "Tor" network make it easy to bypass these prohibitions.

At the same time, one can cite the original opinion of one developer of a free software TOR, which he voiced in an interview.

Expert opinion

Why is anonymity required for ordinary Internet users, who, by definition, have nothing to hide?

The thing is that “there is nothing to hide” is not a reason for state structures to completely control all user actions on the Internet. The most ordinary citizens work in these structures, guided in their work by laws written illiterately by other incompetent citizens. If such people do not like something, they will have to spend money, time and health to prove their innocence with an unpredictable result. Why do we need such a risk, if there is a simple technical means which is supported by other, smarter people.

Among other things, along with anonymity, the user receives protection from censorship on the network at the state level. Should an ordinary citizen think what site can be banned today at the initiative of Deputy Ivanov? This is not the business of this deputy, especially if he is never informed which sites the citizen visited today at will.

Tor network: how to use

TOR is a network of virtual tunnels that will allow the user to best protect privacy and

How TOR works: the program connects the user's computer to the network not directly, but through a chain of several randomly selected computers (relays) that also belong to the TOR network.

All data sent to the Internet using TOR becomes anonymous (the source is hidden) and remains encrypted throughout the entire length between the user's computer and the last relay. After the data is sent from the last relay and sent to the final destination site, this data is already in clear, normal form.

When transferring important data, such as the Username or password to enter the site, you need to make sure that the HTTPS protocol is working.

It is worth noting that we owe the emergence of this anonymous network precisely to the American intelligence services. Once upon a time, the implementation of a spy project took place, which later became infamous. It was called "Open Skies" and for some reason was closed in a short period of time. After that, all the data of the closed network, in particular the source codes, ended up in open access. Based on the information received, the initiative group whose members were experts in the field of the Internet and completely free of charge began to create their own own network not controlled from outside. This private network is called The Onion Router, which means "Onion Router" in Russian. That is why the symbol of the network "Thor" has an image of an onion on the logo. This name explains the principle of the anonymizer - a chain of nodes and connections leading to complete privacy, may be associated with the layers of the bulb. The network works in such a way that the endpoints of the connection cannot be established.

Download and install TOR

Various programs from the TOR package are available for download from the official website of the project. Speaking about the Tor network, how to use it, it should be noted that there are software package TOR browser. It does not require installation and contains a browser. Most often this Mozilla Firefox. The browser is preconfigured for safe exit using TOR to the Internet. You just need to download the package, unpack the archive and run the TOR program.

Using the TOR Browser Bundle

After downloading the TOR Browser Bundle software assembly, you need to save the package to the "Desktop" or USB. Usually, this option is convenient for compact solutions when you need to download TOR from a USB flash drive.

Speaking about how to get into the Tor network, it should be noted that the user must have a directory that contains several files. One of them is the file start Tor Browser or "Launch TOR browser". It depends on which operating system is being used.

After launching the TOR Browser Bundle, the user will first see Vidalia launch and connect to the TOR network. After that, the browser will start, which will confirm the use of TOR at the moment. The TOR network is ready to use.

An important point: it is necessary that the browser that was in the package with TOR be used, and not the user's own browser.

The TOR browser (Mozilla and the Torbutton plugin) has already been configured to completely disable JavaScript, settings for https and other settings for a secure Internet connection.

For the average user, this software package is the best option to work with TOR.

There is also a stationary option for installing TOR. This is a connection to the Tor network using the Vidalia Polipo TOR assembly.

Here is an installation example for Windows 7

You need to download the program from the TOR project website and install it on your computer.

Safe work on the Internet is carried out only with the Mozilla browser with the Torbutton plugin. If this plugin is incompatible with the version of the Mozilla browser, then you need to use the universal FOxyProxy Basic.

Today TOR developers can offer for download bundles(Vidalia Bridge Bundle or Vidalia Relay Bundle). They are already immediately with the settings "bridges" or "relays".

The need for such additional settings may arise for users whose providers block TOR network. These are the BRIDGE settings that can help if Tor does not connect to the network by default.

Proper TOR setup

If the user himself wants to become a member of the TOR project, then you should familiarize yourself with the RELAY settings (relay).

If the provider or system administrator blocks access to the TOR site, then the program itself can be requested by e-mail. In this case, the request is made from the gMail mailbox, you do not need to use e-mail located on Russian free domains.

To receive the English package of the TOR browser for Windows OS, you need to send an email to [email protected]. In the message itself, you only need to write word windows. The subject field can be empty.

A similar method can be used to request the TOR browser for MAC OS. To do this, write "macos-i386". If you have Linux, then you need to write "linux-i386" in the case of a 32-bit system or "linux-x86 64" for a 64-bit system. If you need a translated version of the TOR program, then you need to write "help". instructions and a list of available languages ​​will come.

If TOR is already installed, but does not work, then this could happen for the following reasons.

At normal operation connection, if it does not connect to the "Tor" network, you can try the following: open the "VIdala Control Panel", click on the "Message Log" and select the "Advanced Settings" tab. Problems with connecting TOR can be for the following reasons:

1. Disabled system clock. Need to make sure correct installation date and time on the computer and restart TOR. You may need to synchronize the system clock with the server.

2. The user is behind a firewall. In order for TOR to use 443, you need to open the "VIdala Control Panel", click "Settings and Networks" and check the box next to the inscription "My firewall only allows me to connect to certain ports." This will help set up the Tor network and let it work fully.

3. Blocking TOR from the side anti-virus database. You need to make sure that antivirus program does not prevent TOR from connecting to the network.

4. If the computer still does not connect to the Tor network, then it is very possible that the anonymizer is being blocked by the ISP. This can often be bypassed with TOR bridges, which are hidden relays and are difficult to block.

If you need the exact reason for the inability to connect TOR, then you should send an email to the developers [email protected] and attach information from the log log.

What is a bridge and how to find it

To use a bridge, you must first discover it. It's possible at bridges.torproject.org. You can also send an email to [email protected] After sending the letter, you should make sure that the letter itself says “Get bridges”. Without this, a response letter will not come. It is also important that the sending must be from gmail.com or yahoo.com.

After setting up several bridges, the Tor network will become more stable if some bridges become unavailable. There is no certainty that the bridge used today will also work tomorrow. For this reason, it is required constant update list of bridges.

How the bridge is used

If it is possible to use several bridges, then you should open the "VIdala Control Panel", click "Settings", and then "Networks" and check the box next to the inscription "My provider blocks connection to the TOR network". Next, enter a list of bridges in the field. Then click "OK" and restart TOR.

Using open proxy

If using a bridge fails, you should try configuring TOR while using an HTTPS or SOCKS proxy to access the TOR network. This means that even if TOR is blocked in local network user, that is, the possibility safe use open proxy server to connect.

For further work there should be TOR/Vidalia configurations and a list of https, socks4, or socks5 proxies.

You need to open the "VIdala Control Panel" and click "Settings".
Next, click on the "Networks" tab, select "I use a proxy to access the Internet."

In the "Address" field, enter the address of the Open Proxy. This is the IP address or name of the proxy, then enter the port of the proxy.

Usually no username and password are required. If this is still needed, then they should be entered in the appropriate fields. Select "Type for proxy" as http/https or socks4, or socks 5. Click "OK". Vidalia and TOR are now configured to use a proxy to access the rest of the network.

On the TOR website today it is possible to find many more different products for other operating systems(Mac OS, Linux, Windows). Thus, the search engine in the Tor network can be used regardless of which device you use to visit the Internet. Differences can only be in individual settings regarding the features of the custom OS.

There is already a solution for use of TOR for mobile phones, for example for Android. This option has already been tested and, as it turned out, it is quite efficient, which cannot but rejoice. Especially considering that most of the users have moved because of computers to comfortable lightweight tablets.

TOR system for use in smartphones

As mentioned above, there is a possibility TOR settings on a device with Android platform. To do this, a package called Orbot is installed. A description of how to download it is on the TOR website.

There are also still experimental packages for Nokia and Apple iOS. However, after a series of tests and improvements, the output of an excellent tool that allows you to achieve uniqueness in the network is guaranteed.

In addition, the TOR developers have launched several more anonymizers, such as Tails. This is the OS Linux-based, providing anonymous and secure web surfing. There are a number of other products on the Tor website that will be of interest to the user.

TOR also allows you to use hidden services for users. You can, without revealing your IP address, provide
It is clear that similar service does not find much demand among users, although this information is located on the TOR website at the same time as instructions on how to search the Tor network.

This was the basic information regarding this most famous and well-functioning anonymizer. Today, it is hoped that users will be able to run the TOR network on their computer and continue to use the secure and anonymous internet at your discretion.

Behind last years a lot of rumors spread around global network, which are mainly related to the total surveillance carried out by the American intelligence services.

It is no secret that most popular services completely disregard for user privacy, not even giving access to HTTPS.

Privacy is important for every user. This does not have to be about the negative intentions that some users have.

The presence of privacy and identity of specific data is a completely legitimate right of a person living in the modern world.

There are several main ways to prevent surveillance:

  1. Using HTTPS;
  2. Clearing cookies;
  3. Using a proxy server;
  4. Using anonymous VPN (VPN);
  5. Application of TOR network functions;
  6. Using an I2P network

Almost every single option has its own disadvantages, advantages and a certain degree of security. It is worth reading all the points carefully.

How Cookies are cleared, plugins (java and flash), as well as javascript are prohibited

It is quite useful to delete normal and flash cookies. This is required for users who wish to disable service personalization and ad targeting. Thus, you only have to remove own connection along with a profile or site session. The nature of the data located in the Cookies section largely depends on the service itself.

If a site that uses cookies for conducting sessions has XSS vulnerabilities, then third-party online services are able to deanonymize the user using a profile. For example, you have a login on the linkedin site, in this case, when you post a link on your own site through which you can view the profile in the form of a regular picture, in the future you will be able to find out which users of linkedin were already on your page. You also need to remember that there are several plugins (activated using a browser) that can determine the real IP of the user, even if you have to use a proxy, TOR or I2P, as well as other anonymization tools.


Using HTTPS

Advantage:

  • Ensures the impossibility of interception or substitution of information contained on the site.

Main disadvantages:

  • DNS requests are not encrypted. For example, when using unencrypted WiFi channel, people living in the neighborhood and the provider have the opportunity to familiarize themselves with the sites you visit;
  • A website opened in a web browser receives all information about the user's IP.

Proxy features

There are two types of proxy server at once:

  1. HTTP is designed to relay requests of the GET and POST types, to add the original user's ip address to the request site, to store complete history actions on the site.

Among the advantages are:


Disadvantages:

  • The server has a history;
  • Filtering and replacing the main data set with a proxy server;
  • Exclusive operation of the HTTP protocol;
  • There is no protection against attacks carried out using special plugins, as well as XSS

During SOCKS proxy usage, the browser is able to open each TCP socket using the server name. In this case, (it all depends on the web browser) the user is able to use own server DNS, however, the site, for some reason, will not track the user by issuing a name in a unique form for all requests in its own subdomain. The system will also remember information coming from specific addresses.

  • Ensuring the anonymity of the client (in case of correct use);
  • Forwarding an arbitrary TCP connection;
  • DNS queries involving the server name
  • DNS queries using the client's name;
  • Carrying out filtering, as well as substitution of information data by a proxy server;
  • Availability of history on the main server;
  • There is no reliable protection against attacks coming with the help of plugins, as well as XSS.

The level of security is provided in the same way as in SOKS proxy.

Main advantages:

  • The client has an unknown status;
  • Presence network interface, which has an "anonymous" address. There is no need to carry out separate setting browser, as well as other programs associated with it

Key disadvantages:

  • Much more expensive. Some countries require the provision of separate IPs to clients;
  • Plugin attack protection, no XSS

Renting a dedicated server

From the pros:

  • Unknown client status;
  • Flexible configuration of HTTP/SOCKS proxy types, which can be done independently;
  • Prevention of attacks carried out using plug-ins, XSS when launching the browser remotely.

Key shortcomings include:

  • May require deanonymization in certain regions (passports, credit cards)

Tor is able to provide complete anonymity to the user browsing Internet services. However, Internet traffic is able to pass through another continent, significantly slowing down the loading of many pages that the user tries to open.

Top Related Articles