How to set up smartphones and PCs. Informational portal

What is tor network. Minor disadvantages of Tor

Apparently, the Tor network remains unhacked. At least according to an internal NSA report from 2012, although the organization had the ability to disclose the ownership of certain nodes in certain cases, in general they are not able to disclose any node upon request. Yes, and these disclosures occurred by chance, such as an error in the Firefox browser, which was included in the tor bundle and others like that. If you use Tor correctly, then the probability of disclosure is extremely small.

2. Tor is not only used by criminals

Contrary to popular belief, Tor is used not only by criminals, pedophiles and other bad terrorists. This, to put it mildly, is far from the case. Activists of all kinds, journalists, just people who love privacy make up the portrait of Tor users. Personally, I am very impressed with the position of the Tor developers, who answer the question “what, do you have something to hide?” phrase: "No, it's not a secret - it's just none of your business."
And criminals have a large arsenal of tools, from identity change to stolen devices or network access, from botnets to Trojan viruses. Using and promoting Tor you help criminals no more than using the Internet.

3. Tor has no hidden loopholes or backdoors

Rumor has it that Tor was created by the military, and they deliberately made hidden loopholes in it. Although Tor was originally funded with US Navy money, since then its code has been in the public domain, and many cryptographers have studied its source code. Everyone can study them. And now enthusiasts, advocates of privacy and anonymity on the Internet, are working on the project.
There is also information that the US intelligence agencies hold about 60% of all nodes - but this is most likely distorted information that about 60% of the funding is allocated by the US in the form of grants.

4. There were no cases of condemnation of anyone for supporting the relay node

True, in Europe, in this beacon of human rights and legal paradise, or rather, in Austria, just the other day, the person who held the exit node was accused of complicity, because. Illegal traffic passed through this node. So the danger of keeping an exit node is obvious. Well, relay nodes should be out of danger, since according to the network operation scheme they do not know where the request came from, where it is directed, or what kind of traffic they transmit. And to prove the passage of traffic through the relay is almost impossible.

5. Tor is easy to use.

Many people think that Tor is something difficult for hackers and computer geniuses. In fact, the developers have already simplified its use as much as possible - just download Tor Browser, and when you start it, you will automatically use the Tor network. No settings, commands on the command line and other things.

6. Tor is not as slow as you think

A couple of years ago, the network was slow. Now access to sites occurs at a quite acceptable speed. Yes, you can't download torrents through Tor - it's both slow and harmful to the network. But you can conduct any other habitual activity without irritation.

7. Tor is not a panacea

Using Tor, you still need to follow a few rules and understand a little about how it works, what it can and cannot do, so as not to negate all its efforts. If you're using Tor Browser and you're logged into Facebook at the same time, it doesn't make much sense. Understand how it works and use it wisely.

Personally, I am a supporter of maintaining privacy and anonymity on the Internet. I propagate and urge everyone to support the Tor project as necessary and useful, especially in light of the sad events with the new anti-Internet laws. Support the Tor network. Set yourself a relay - if you can allocate at least 50 kb / s for Tor in your channel, this will already be enough.

Why I stand for privacy and the possibility of anonymity. After all, I'm a law-abiding citizen and I have nothing to hide, right?
Well, I personally can answer this with the following arguments:

  • I may have nothing to hide, but what I do is none of your business
  • Times change, people change, and laws change. I wrote something in the comments, and a couple of years after the adoption of another chic law, it suddenly became possible to classify it as extremist statements
  • I do not believe that all the people who are trying to follow my actions are crystal honest and devoted servants of Themis. That no one will try to use the information received for their dirty selfish purposes.

It will be interesting to know your opinion on privacy and anonymity,% username%

To get more anonymity on the Internet and not set up a VPN over and over again, you can download a browser called Tor. This browser is a modification of Mozilla Firefox, has many built-in functions for creating a proxy server, increasing anonymity, and various configuration tips. At the first start, Tor will ask you to set up your connection for further access to the network. Your habitual browsing on the Internet will not change much, however, the connection will be somewhat slow, the location request is disabled, which means that all search parameters are reset: you will not see your most visited sites or select ad feeds, this can also slow down your Internet surfing. Of course, in exchange for small inconveniences, you get full anonymity and access to any information or site.

Download the browser from the official site if you haven't already. Follow the link http://tor-browser.ru and choose your download method. On the same page it is possible to make a donation to the project. Once the browser is saved, you will see the “Tor Browser” folder and find the “Start Tor Browser” file either in it or on your desktop.


You will have a few seconds to set your own browser settings, otherwise it will perform a standard login. Your connection will go through several addresses in different parts of the world, only then it will reach the site.
Click "Open Settings" to change the settings.


You will have three possible options:
  • “My ISP is blocking access to Tor” is a setting for network savvy people. You will be prompted to enter bridges manually to bypass the ISP block. In fact, such blocking is rare.
  • The second point implies your own proxy for anonymous access to the Internet. You have to configure the port and account.
  • “My firewall only allows me to connect to certain ports” - again, often many ports are closed by the ISP, and you cannot connect to them. Find out which ports are open for you and enter them in this paragraph.


This is what each item looks like. If you don't need them and just want a replacement VPN, then undo these edits and exit the settings.


When you first open it, Thor gives you a hint: don't stretch the browser to full screen so that no one knows its true size. If you are not a sophisticated anonymous, then you can ignore this hint.


The search itself on the Internet occurs in the most common way: you enter a request and get an answer. Of course, everything will look a little different than usual:
  • The dominant language in the browser is English so that no one recognizes your region.
  • The second point follows from the first: your region is not specified, which means there is no smart selection of pages in the search.
  • There are no ads or marketing tracking you.

It's better to know right away what kind of site you need.


To set up your browser and also see which IPs you have gone through, you need to find the green onion icon in the top bar.

By clicking on it, IP addresses and countries will appear on the right. On the left is the settings panel.

  • “New identity” - resets all the parameters you previously set and opens the browser again.
  • The item “New chain for this site” changes the IP addresses on the right.

You may need security settings and Tor settings. The browser settings lead to the same window that you saw at the beginning: there you can configure proxies and specify open ports.


In the security settings, it is better to leave all the checkboxes enabled so as not to expose yourself to verification by sites.


There you will also see a slider that adjusts the overall level of your protection. By moving it, on the right you will see a description of the changes.


You can also configure the duckduckgo search engine, which is used by the default Tor browser. To do this, click on the three stripes on the top right.


In addition to choosing a color scheme, the main section “Settings” is available to you.


This is where you can specify your language, region, enable or disable tracking, load the browser on startup, and other options. However, it is recommended to leave the parameters as they were set by the browser itself, since this combination helps you remain anonymous.

Now you can not set up a VPN for yourself, but simply use the Tor browser when you really need it. It is not suitable for everyday use, as it takes longer to load pages and does not select the search according to your preferences, but in some situations it remains indispensable.


Good evening, dear readers and lovers of computer technology, we continue to study the Windows 10 Anniversary Update operating system, and today I want to touch on the topic of security and anonymity on the Internet, we will analyze how to use the tor browser and get to know it in general.

Anonymity on the Internet

And so, those users who have been using such an invention as the Internet for a long time, at least once wondered how I can organize anonymity on the Internet, a person can have different reasons for this, from persecution mania to real hiding from special services, an example can be hackers. And many of them use the tor browser for such calm surfing on the World Wide Web.

History and principle of operation of the tor network

As was customary from the past centuries, this is an idea of ​​the pendos military. Their motives are still not known and there is no exact data on this, at the beginning of 2000, for some reason, they decided to put this technology into public access, even with all the source codes. Directly a gift of some kind, as if on purpose. Maybe there was a hidden reason in this, but there is no reason not to trust the browser, since the community has done everything to make this project independent and protected. For 15 years, these codes have been well researched and have not revealed hidden loopholes to monitor users.

The main principle of the tor browser is that you can surf the Internet, download files or watch videos, completely anonymously and without traces. For example, opening the site address in the Torah, the path will be the site, I will not be able to find out your real ip address issued by your provider.

In general, tor itself was conceived for some such freedom on the network, but someone can use it in dark deeds, it all depends on the tasks. Recently, we all felt the first step in the fight against piracy in Russia, namely, access to torrents was closed, and there I told you that Tor can bypass this. This is its original purpose, to bypass country-level site blocking bans. Providers won't even know you did it.

How TOR works - Everything is very simple here. There is a network of nodes for this technology around the world and random three nodes will be used for data transfer. Nobody knows what, it's a roulette wheel.

The Tor browser will send packets to the first node, and the encrypted address of the second node will also be contained there. The first node has a key for the cipher, and when it understands who the second node will be, it redirects the network packet there (the layers of the onion). On the second node, you receive a packet containing the key to decrypt the address of node 3. This scheme makes it difficult to understand exactly what you are opening in your Tor Browser. Encrypting on each of the nodes of the Tor network and changing the IP address from which the request is coming. Computers on the network that act as proxy servers are called relays.

I would like to point out again that only the path is encrypted, point-to-point routes, all packet content will be unencrypted. So, if you suddenly want more security in the transfer of important data, then encrypt them before transfer, for example, in the TrueCrypt utility. In the tor browser, you will not find tails in SSL and TLS about service information, everything will be cut out, so that it will not work to understand what operating system or program you have.

And so, there is a user Alice, she makes a request to the global directory server, from him she wants to understand where the Tor network servers are located. A chain is created, everyone knows only their own route, no one knows the whole. Data transfer starts. Your local Tor Browser negotiates a list of encryption keys with each node.

Due to the way Alice's Tor client encrypts her data, each node in the chain can only know the IP addresses of the nodes directly adjacent to it. Let's say the first Tor server in the chain knows that Alice's Tor client is sending some data and that it should be passed to the second Tor server. Similarly, Bob only knows that he is receiving data from the last Tor server in the chain, but has no idea about the real Alice.

Networks of torus are counted in thousands of nodes, and if you understand that every time a bunch of three nodes changes, it is simply very difficult to calculate you, due to this, and is achieved.

Of the minuses of the TOR network, it can be said that all nodes are ordinary computers, and not mega cool and high-speed equipment, so that the data transfer rate may be less than you are used to on a regular browser.

tor browser facts

  • Tor has not yet been hacked by anyone. There is not a single reliable case of hacking in this network.
  • Tor is also used by ordinary people, and not just desperate hackers. Often it is used by journalists, people who are interested in life behind the Chinese firewall, the developers of this brainchild answered this coolly

What, do you have something to hide? phrase: "No, it's not a secret - it's just none of your business

  • The tor browser has no loopholes and hidden holes
  • No one has yet been convicted for supporting a relay node, this is when you make your computer chat on the Tor network and traffic is chasing through it.
  • tor browser is very easy to use

Download tor browser for windows

We have figured out everything with the principle of work, now you need to download the tor browser for windows. Let's go to the official site.

https://www.torproject.org/projects/torbrowser.html.en

Go down a little lower and see the summary table of the tor browser localization, select the language you need, I have it Russian, do not forget to select the correct bit depth (32-64) to read the post on the link on the left.

Installing Tor Browser

After you have downloaded the Tor browser, launch it, first of all, select the language of the program.

All installation and unpacking is completed and our tor browser is ready to use, check both checkboxes to create a shortcut and launch the application.

Setting up the tor browser

the construction of a chain of torus nodes will begin.

You will open Tor immediately click the Open security settings button.

There will be a scale with increasing browser security, I advise you to choose either medium or moderate high. On the right side, you will be described what is changing.

If you open the onion icon, you will be able to trace its chain of three nodes when you open the site, in my example the traffic went to the USA > France > Norway.

Earlier, I told you that the provider gives you. For example, I open the Google Chrome browser, go to the 2ip.ru website and see that my real ip address is 185.71.69.218

Now I open the Tor browser, I also go to 2ip.ru from it and see another country and ip address 213.252.247.231

If you click on the bow icon in the top left corner and rebuild the thread for this site, then we are moving to the Netherlands. I think now you understand how to use the tor browser in Windows 10 and how it builds chains.

Setting up the tor browser

In order to get into the tor settings, press the button in the upper right corner and the context menu will open, we are interested in Add-ons or Settings. Let's go to Addons.

By default, 4 extensions are installed:

  • Https-Everywhere > makes sure you always surf the internet via https
  • NoScript > disable scripts on sites, more secure
  • Torbutton > this is essentially the engine

If you click settings at Torbutton, you will see

  • Do not save browsing history
  • Disable Extensions
  • Block third party cookies
  • Change information that distinguishes you from other users

Now let's go to the tor browser settings. The first tab is the main one, here Tor Browser can be selected as the default browser.

On the Search tab, you can set the default search engine to choose from the most popular Western players.

In the content, you can set to block pop-ups

In privacy, be sure to check the box Tell sites that I don't want to be tracked so that you don't get ads based on your interests.

Well, the protection tab, here from the useful Block sites suspected of attacks.

How to set up tor as a relay

Earlier, at the very beginning, I wrote to you that you can make your computer part of the tor network and drive traffic both inside and outside it, earlier, up to version 3, the Vidalia mechanism was built into the browser.

Thanks to the Vidalia mechanism, you lift as a whole. Download and unpack. As a result, you will have two folders and one file. Put them in the root with Tor Browser installed.

We launch Start Vidalia. If an error appears that Vidalia could not start. then click Show settings.

We restart Start Vidalia and see that everything is perfectly connected.

Let's start looking at the settings, click Traffic Graph, a convenient window with network statistics will appear. Ran your anonymous traffic.

Next, click on the network overview in order to see how many repeaters there are around the world now, after a full load I got more than 8000. Unfortunately, now for some reason it does not show the indication of the country of the node. But it's all fixable, I'll show you how.

  • Work only as a client, that is, network traffic will not be sent through you
  • Relay traffic to the internal tor network
  • Relay Tor network traffic to the output

The tab additionally contains network settings and the most necessary Tor settings file, and it needs to be edited for fine cheating.

This is what the contents of the torrc file looks like, I advise you to edit it with a regular notepad from the directory where it is located.

I hope you were interested in raising your Anonymity on the Internet and understanding the principle of the Tor browser.

How to remove tor browser

Yes, I forgot to say that in order to remove the tor browser, you just need to delete its folder, since this is a portable program, everything is simple.

  • Translation

Tor is an anonymity tool used by people who seek privacy and fight censorship on the internet. Over time, Tor has become very, very good at doing its job. Therefore, the security, stability, and speed of this network is critical to the people who rely on it.

But how does Tor work under the hood? In this article, we'll dive into the structure and protocols used on the web to get a close look at how Tor works.

A Brief History of Tor

The concept of onion routing (we will explain this name later) was first proposed in 1995. At first, these studies were funded by the Department of Naval Research, and then in 1997 DARPA joined the project. Since then, the Tor Project has been funded by various donors, and not so long ago, the project won a donation campaign on reddit.

The code for the modern Tor software was open-sourced in October 2003, and it was the 3rd generation of onion routing software. Its idea is that we wrap traffic in encrypted layers (like an onion) to protect the data and anonymity of the sender and recipient.

Tor Basics

We figured out the history - let's get down to the principles of work. At its highest level, Tor works by relaying your computer's connection to target computers (such as google.com) through multiple intermediary computers, or relays.



Packet path: guard node, intermediate node, exit node, destination

Now (February 2015), about 6000 routers are engaged in the transmission of traffic in the Tor network. They are located all over the world and run by volunteers who agree to donate some traffic to a good cause. It is important that most of the nodes do not have any special hardware or additional software - they all run using the Tor software configured to work as a node.

The speed and anonymity of the Tor network depends on the number of nodes - the more the better! And this is understandable, since the traffic of one node is limited. The more nodes you have to choose from, the harder it is to track a user.

Node types

By default, Tor passes traffic through 3 nodes. Each of them has its own role (we will analyze them in detail later).


Client, guard node, intermediate node, exit node, destination

The input or guard node is the entry point to the network. The input nodes are selected from those that work for a long time, and have shown themselves to be stable and high-speed.
Intermediate node - transmits traffic from security to the weekend. As a result, the former do not know anything about the latter.
An exit node is an exit point from the network that sends traffic to the destination that the client needs.

The usually secure method of running a sentry or smart host is a virtual server (DigitalOcean, EC2) - in this case, server operators will see only encrypted traffic.

But exit node operators have a special responsibility. Because they send traffic to the destination, any illegal activity done through Tor will be bound to the exit node. And this can lead to police raids, notifications of illegal activities and other things.

Meet the exit node operator - thank him. He deserves it.

And what about onions?

Having understood the route of connections going through the nodes, we ask ourselves the question - how can we trust them? How can you be sure that they won't hack the connection and extract all the data from it? In short - and we do not need to trust them!

The Tor network is designed so that nodes can be treated with minimal trust. This is achieved through encryption.

So what about the bulbs? Let's take a look at how encryption works in the process of establishing a client connection over the Tor network.

The client encrypts the data so that only the exit node can decrypt it.
This data is then encrypted again so that only the intermediate host can decrypt it.
And then this data is encrypted again so that only the sentinel node can decrypt it.

It turns out that we wrapped the original data in layers of encryption - like an onion. As a result, each node has only the information that it needs - where the encrypted data came from, and where it should be sent. Such encryption is useful for everyone - the client traffic is not open, and the nodes are not responsible for the content of the transmitted data.

Note: The output nodes can see the original data because they need to send it to the destination. Therefore, they can extract valuable information from the traffic, transmitted in clear text via HTTP and FTP!

Nodes and Bridges: The Problem with Nodes

After starting the Tor client, it needs to get the lists of all input, intermediate and output nodes. And this list is not a secret - later I will tell you how it is distributed (you can search the documentation for the word “concensus” yourself). Publicity of the list is necessary, but there is a problem in it.

To understand it, let's pretend to be attackers and ask ourselves: what would an Authoritarian Government (AP) do? Thinking in this way, we can understand why Tor is designed the way it is.

So what would the AP do? Censorship is serious business, and Tor allows you to bypass it, so the AP would want to block users from accessing Tor. There are two ways to do this:

  • block users leaving Tor;
  • block users from entering Tor.

The first is possible, and it is the free choice of the owner of the router or the website. All he needs to do is download the list of Tor exit nodes and block all traffic from them. This will be bad, but Tor can't do anything about it.

The second option is seriously worse. Blocking outgoing users from Tor can prevent them from visiting a particular service, and blocking all incoming users from going to any sites - Tor becomes useless for those users who are already suffering from censorship, as a result of which they turned to this service. And if there were only nodes in Tor, this would be possible, since the UA can download the list of sentinel nodes and block traffic to them.

It's good that the Tor developers thought about this and came up with a clever solution to the problem. Get to know bridges.

Bridges

Essentially, bridges are nodes that are not publicly available. Users behind a wall of censorship can use them to access the Tor network. But if they don't get published, how do users know where to find them? Is there a special list needed? We'll talk about it later, but in short, yes - there is a list of bridges that the project developers are involved in.

It's just not public. Instead, users may receive a small list of bridges to connect to the rest of the network. This list, BridgeDB, only gives users a few bridges at a time. This is reasonable, since they do not need many bridges at once.

By issuing multiple bridges, you can prevent the blocking of the network by the Authoritarian Government. Of course, by getting information about new nodes, you can block them too, but can someone discover all the bridges?

Can someone discover all the bridges

The list of bridges is strictly confidential. If the UA gets this list, it can completely block Tor. Therefore, network designers have been researching the possibilities of obtaining a list of all bridges.

I will describe in detail two items from this list, 2nd and 6th, since these are the methods that managed to access the bridges. In point 6, researchers looking for Tor bridges scanned the entire IPv4 space with the ZMap port scanner, and found between 79% and 86% of all bridges.

The 2nd point implies the launch of an intermediate Tor node, which can monitor requests that come to it. An intermediate node is accessed only by guard nodes and bridges - and if the addressed node is not in the public list of nodes, then it is obvious that this node is a bridge. This is a serious challenge to Tor, or any other network. Since users cannot be trusted, it is necessary to make the network as anonymous and private as possible, which is why the network is made that way.

Consensus

Consider how the network functions at a lower level. How it is organized and how to find out which nodes in the network are active. We have already mentioned that the network has a list of nodes and a list of bridges. Let's talk about who makes these lists.

Each Tor client contains fixed information about 10 powerful nodes maintained by trusted volunteers. They have a special task - to monitor the status of the entire network. They are called directory authorities (DAs that manage lists).

They are distributed around the world and are responsible for distributing a constantly updated list of all known Tor nodes. They choose which nodes to work with and when.

Why 10? It's usually not a good idea to make a committee of an even number of members so that the vote won't end up in a tie. The bottom line is that 9 DAs deal with lists of nodes, and one DA (Tonga) deals with a list of bridges


List of D.A.s

Reaching consensus

So how do DAs keep the network up and running?

The status of all nodes is contained in an updatable document called "consensus". The DA maintains it and updates it hourly by voting. Here's how it goes:

  • each DA creates a list of known nodes;
  • then it calculates all other data - node flags, traffic weights, etc.;
  • sends data as "status vote" to everyone else;
  • gets the votes of everyone else;
  • combines and signs all parameters of all voices;
  • sends signed data to others;
  • the majority of DAs must agree on the data and confirm that there is a consensus;
  • the consensus is published by each DA.

The consensus is published over HTTP so that everyone can download the latest version. You can check it yourself by downloading the consensus via Tor or via the tor26 gate.

And what does it mean?

The Anatomy of a Consensus

Just reading the specification, this document is difficult to understand. I like the visual display to understand how the structure works. To do this, I made a poster in the style of corkami. And here is a (clickable) graphical representation of that document.

What happens if the knot goes into all serious

In a detailed review of the principles of the network, we have not yet touched on the principles of the output nodes. These are the last links in the Tor chain, providing a path from the client to the server. Since they are sending data to the destination, they can see it as if it just left the device.

This transparency implies a great deal of trust in the exit nodes, and they usually behave responsibly. But not always. So what happens when the exit node operator decides to turn on Tor users?

Sniffer Case

Tor exit nodes are almost a reference example of a "man-in-the-middle" (MitM). This means that any non-encrypted communication protocols (FTP, HTTP, SMTP) can be tracked by it. And these are logins and passwords, cookies, uploaded and downloaded files.

Exit nodes can see traffic as if it just left the device.

The ambush is that there is nothing we can do about it (other than using encrypted protocols). Sniffing, passive listening on the network, does not require active participation, so the only defense is to understand the problem and avoid transmitting sensitive data without encryption.

But let's say the exit node operator decides to damage the network in a big way. Listening is the occupation of fools. Let's modify the traffic!

We squeeze the maximum

Recall that the exit node operator is responsible for ensuring that traffic to and from the client is not modified. Yeah of course…

Let's see how we can change it.

SSL MiTM & sslstrip
SSL spoils all the raspberries when we try to screw up users. Luckily for attackers, many sites have problems implementing it, allowing us to force the user to go over unencrypted connections. Examples are redirecting from HTTP to HTTPS, enabling HTTP content on HTTPS sites, etc.

A convenient tool for exploiting vulnerabilities is sslstrip. We only need to pass all outgoing traffic through it, and in many cases we will be able to harm the user. Of course, we can just use a self-signed certificate and look at the SSL traffic passing through the node. Easily!

Hooking browsers to BeEF
Having examined the details of the traffic, you can start wrecking. For example, you can use the BeEF framework to take control of browsers. Then we can use the "browser autopwn" function from Metasploit, as a result of which the host will be compromised, and we will be able to execute commands on it. We've arrived!..
Back door binaries
Let's say that binaries are downloaded through our node - software or updates to it. Sometimes the user may not even be aware that updates are being downloaded. We just need to add a back door to them with tools like The Backdoor Factory. Then, after the program is executed, the host will be compromised. We've arrived again!
How to catch Walter White
While most Tor exit nodes behave decently, it's not uncommon for some of them to behave destructively. All the attacks that we talked about in theory have already taken place.

In part, the developers thought about this as well, and developed a safeguard against clients using bad exit nodes. It works as a flag in the consensus called BadExit.

To solve the problem of catching bad exit nodes, a tricky exitmap system has been developed. It works like this: for each output node, a Python module is launched that handles logins, downloading files, and so on. The results of his work are then recorded.

Exitmap works using the Stem library (designed to work with Tor from Python) to help build schemas for each exit node. Simple but effective.

Exitmap was created in 2013 as part of the "bad bulbs" program. The authors found 65 exit nodes that change traffic. It turns out that although this is not a disaster (at the time of work there were about 1000 output nodes in total), but the problem is serious enough to track violations. Therefore, exitmap still works and is supported.

In another example, the explorer simply created a fake login page, and logged in through every exit node. Then the HTTP logs of the server were looked at for an example of login attempts. Many hosts tried to infiltrate the site with the username and password used by the author.

This problem is not unique to Tor

It's important to note that this isn't just a Tor problem. Between you and the photo of the cat you want to look at, there are already quite a few nodes. It only takes one person with hostile intentions to cause a lot of harm. The best thing to do here is to force encryption to be enabled where possible. If traffic cannot be recognized, it cannot be easily changed.

And remember that this is just an example of bad operator behavior, not the norm. The vast majority of exit nodes take their role very seriously and deserve a lot of credit for all the risks they take in the name of the free flow of information.

Especially for those who want not to depend on their state, their provider, their admin, etc. And also for those who do not want to be "recognized by IP".

Today I'll tell you about the "TOR project". In the first part I will tell you how and where to download the program. In the second part I will tell you how to install it. In the third - how to run and use. In the fourth - how to configure the Opera browser to work with TOR.

But first, I'll tell you in a little simple words what "TOR" is. TOR is an abbreviation for "The Onion Router" in English. What it is?

Here's what the wiki says:

With TOR, users can remain anonymous when visiting websites, posting content, sending messages, and using other applications. TOR technology also provides protection against traffic analysis mechanisms that threaten not only the anonymity of the user, but also the confidentiality of business data, business contacts, etc.
That is, no one but you will know who you are, where you are from, and where you went on the Internet. These are pluses. Minuses? There are also disadvantages, but about them - later.

What tasks can TOR solve?
1. Visiting sites blocked by your state, provider or system administrator. For example, with the help of TOR you can easily go to Odnoklassniki or Vkontakte, no matter how your management and administrators block them.
2. TOR can work even through a proxy (!!!).
3. Through TOR, you can send traffic to your IM (instant messenger), such as ICQ, Mailru agent, Jabber, etc., even if they are blocked at your work.
4. TOR does not require installation. Therefore, you can not be afraid of the ban on installing programs, which was set by the system administrator.

Thus, TOR is a real panacea for all prohibitions, on the one hand, and violation of anonymity, on the other. If you decide that you need it, it's time to download it, install it and start using it.

There you need to find this picture and click on the one circled in red:

On the page that opens, pay attention to what is circled in blue:

You must select "Russian":

Now you can click on the orange button that says "Download" and download TOR on Russian language. The installer is currently approximately 22 MB in size.

Part 2. Install TOR Browser
I'll start with a strange phrase: "TOR browser does not require installation." Yes Yes! The file you actually downloaded is a self-extracting archive. At startup, it will ask where to unpack:


Click on the "" button, select the directory for unpacking. Attention! I repeat for the 3rd time: TOR browser does not require installation, and you can even run it from a flash drive! Therefore, you can unzip it even on a USB flash drive. After selecting a directory, click on the "" button.

The program will unpack for some time:

After unpacking, the "Tor Browser" directory will appear in the directory you have chosen:

Inside it is a file called "Start Tor Browser":

Actually, that's all. You can run TOR browser.

Part 3. Launching Tor
Everything is simple here! Remember the "Start Tor Browser" file from Part 2? Run it!

For some time, the program will perform some shamanistic actions:

I will warn you right away, the first launch takes a very long time. But then you will see this after waiting:


Pay attention to the blue frame. This green onion indicates that Tor is up and running. From the settings, I recommend paying attention to the checkbox "Show this window at startup" (red frame). I recommend unchecking this box. Anyway, always after the start of Tor, the browser "Mozilla Firefox" (the portable version of which comes with the program) will be launched.

In addition, the Tor icon is placed in the tray and can take one of the following forms:

  • - Tor starts;
  • - Tor works;
  • - Tor is stopped.

  • After starting Tor-a, the browser will show something like this window:

    Actually, if you see such a window, you can start to rejoice and use Tor for your needs.

    But there is one problem: this can only be done in the Mozilla Firefox browser. Moreover, this browser must be running. After all, it is worth closing the browser, Tor will also close. Therefore, I installed the "Minimize to tray" add-on in this browser (let it lie there). And he set up one of his Opera to work with him. And now I will teach you how to do it.

    Part 4. Setting up Opera to work with TOR
    To determine if your browser works through TOR or not, you can click on this magical link: https://check.torproject.org/?lang=ru .

    Here's what the Opera browser showed me:

    It doesn't work... But, as they say in the army, if you don't want to, we'll teach you; if you can't, we'll force you.

    Go to Opera settings:

    To do this, click on the "Opera" button at the top left of the browser (blue frame), select the "Settings" item (red frame) in the drop-down menu, and then the "General settings" item (green frame). Or just press "Ctrl + F12".

    Get into the Opera settings:


    Here you need to select the last tab on the right "Advanced".

    Now you need to select the "Network" tab:

    There, click on the "" button:

    Now you need to fill everything as shown in the screenshot below:

    After that, click on the "OK" button.

    We check the browser now with the help of a magic link. Everything is fine!

    Now I will answer the questions that you will ask me.
    1. Can I use other browsers for Tor (like Google Chrome)?
    Description

    Top Related Articles