How to set up smartphones and PCs. Informational portal

Thor browser mobile version. Thor browser (anonymous internet)

Hello dear readers of the blog site. You probably know that any of your actions on the network (viewed pages of sites, downloaded files, watched videos) can be tracked from completely different places (by contacting your Internet provider, digging into your computer or looking in the logs of those sites that you visited ). Online anonymity exists only if you do not start "digging deep".

There are some solutions to the "trail problem" we have already covered. For example, it is possible and then the traces of your visits will not be saved on your computer. Or, for example, when blocking access to some sites (for example, to enter Contact or Odnoklassniki from a work computer).

But there is a much more comprehensive solution - this is the so-called TOR... In fact, this is software that, with a very high degree of probability, allows you to hide everything you do and did on the Internet from prying eyes. It is precisely on the basis of this technology that it works. Thor Browser, which will be discussed today. In fact, it wraps a complex technology in a shell of an ordinary-looking browser accessible to any Internet user, which everyone knows how to use. But its filling is unusual ...

What is TOR?

I do not want to load you with technical terms and concepts, which, by and large, will be superfluous. Just literally in a nutshell (on my fingers) I will outline the principle of operation of the Tor technology and the Tor Browser built on its basis. This knowledge will allow you to understand what to expect from this software, what strengths and weaknesses it has in order to consciously use it for your needs.

So, initially all this was brewed in one of the US military departments. Why they needed it, history is silent, but at the beginning of the 2000s, the rudiments of Thor technology were completely unexpectedly made public. Moreover, the source codes were opened and this software fell into the status of free distribution. What does it mean? And how much can you trust such a "gift"?

The question is fair, but you can trust precisely because of the openness of the code of this technology. The fact is that since then (over a decade and a half) these program codes have been studied (and changed) by hundreds, if not thousands of people who understand this, and no "bookmarks" and "secret doors" have been found. Where it's about safety(in our case, the transfer and storage of information), it is better to work with open source software (software).

Incidentally, this is precisely why, when choosing n, and for. They just belong to the category of free software and their code was checked by thousands of competent specialists. So it is somehow calmer, because I store a lot of passwords from services tied to money and it would be very expensive to lose them.

So, TOP technology allows you to go to sites and download something from the network. leaving no trace behind... That is, when you open a site, for example, through the Tor Browser, it will not be possible to track the IP address of your computer on this site (and therefore to calculate you). Even your ISP will not understand (if they wanted to) that you visited this site (and it will be impossible to prove it). Well, the browser itself will not store all traces of your wanderings on the Internet.

Great, isn't it? I understand that in this way people can cover up their dark deeds. Not without this, of course. But the general idea of ​​Thor is still bright - to provide the Internet user with real freedom in the form of complete anonymity. For example, in some countries, access to some resources may not be justifiably blocked, and the Tor Browser will allow you to bypass these obstacles and not be punished for this violation, because they will not find out that you did it (or will not prove it). But not the point ...

How TOR works? This is called onion routing. Look. There is a network of nodes owned by adherents of this technology. Three arbitrary nodes are used to transfer data. But which ones? And this is exactly what no one knows.

The Tor browser sends a packet to the first node, and it contains the encrypted address of the second node. The first node knows the key for the cipher and, having learned the address of the second, forwards the packet there (it's like the first layer was removed from an onion). The second node, having received the packet, has a key to decrypt the address of the third node (another layer was removed from the bow). Thus, from the outside it is not possible to understand which site you eventually opened in your Tor Browser window.

But please note that only the path is encrypted(routing), and the actual contents of the packets are not encrypted. Therefore, to transfer secret data, it would be better to encrypt them beforehand (at least in the TruCrypt mentioned above), because the possibility of intercepting them (for example, using sniffers) exists.

In addition, this technology there are a few more disadvantages(or features):

  1. The ISP (or someone else monitoring your traffic) might figure out that you are using Tor. What exactly you are watching or doing on the web, he does not know, but sometimes the very fact of knowing that you are hiding something can have consequences. Consider this and, if possible, study ways to enhance camouflage (and they exist), if this is critical for you.
  2. The TOR network uses not special high-speed equipment, but, in fact, ordinary computers. From here comes another drawback - speed the transmission of information in this secret network can vary significantly and sometimes it is clearly not enough for, for example, viewing media content.

Where to download the official Russian version of Tor Browser?

On this blog, I have already published an article on that. The Torah was also mentioned there. Naturally, it is better and safer to download any product from the developer's website, that is, the official one (I think you know). The Tor Browser download page is located at this address (once again, for the sake of safety, it is better to download from the official site):

Please note that you must select a language before clicking on the download button. The default is English, but a dozen more options can be selected from the drop-down list, including fully localized Russian version... So it will work more pleasantly when the interface language is native.

Although, during installation, you will again be asked about the preferred interface language and there you can also choose Russian. Otherwise, the installation process is no different from installing any other browser.

However, upon first launch, you will be asked if you need to make additional settings. to connect to the TOR network... In the overwhelming majority of cases, it will be enough just to click on the "Connect" button:

It will take some time for the browser to successfully connect to the Tor network:

After that, a window of a browser, which at first glance looks normal, will open, but it works with the Internet by creating encrypted tunnels (analogs).

However, the developers themselves emphasize that Thor is not a panacea(at least with default settings). Therefore, those who are paranoid about absolute anonymity are advised to follow the link for clarification on this matter.

How to use the Tor browser?

When you first load the browser, you are immediately prompted use anonymizer for search at disconnect.me. Actually, it is this service that will be used as "" in this browser (you can change this in the settings), Ie. when you enter a query on the newly opened browser tabs or when you enter it through the address bar on any tab, the disconnect.me anonymizer will open with the search results.

The search is actually conducted by Google (you can select from the settings in the upper panel of the service - see the screenshot below), but there are no traces of who exactly searched , so those who are concerned with anonymity need to keep this in mind).

Don't forget also select and search language(in the top panel of the disconnect.me window on the right), because thanks to the anonymizer, Google will not be able to recognize your preferred language automatically. Although, choosing, for example, Russian, you to some extent open the veil of the secrecy of your incognito for this search engine. But here you have to compromise - either convenience or paranoia.

Yes, even the browser from Tor, when you first click on the link, will warn you that it is better to load pages in English, in order to avoid, so to speak.

Personally, I chose the option "No", because convenience is more important to me, and I do not speak any other languages ​​besides Russian. Alas and ah.

By the way, you can check it yourself that you were really "encrypted". To do this, it will be enough to go from any other browser to the site, and then do the same from under the Thor. As you can see, TOR is a substitute (I became a sultry Norwegian) and this is only a small part of protecting your anonymity.

By the way, if you click on the onion to the left of the address bar, you can see the very chain of three nodes (proxy) that separates your computer from the site where you go (I wrote about onion routing just above):

This chain of nodes can be changed if desired. You can also change your "browser-made personality" if the current one is not to your liking. However, this will close all open tabs in Tor and it will be automatically reloaded.

You can immediately access security settings:

By default, all privacy settings (anonymity are enabled), but the security level is at the lowest level due to the fact that only in this case you all functions of this browser will be available... When you set the security settings of the Tor browser to the "high" position, a whole bunch of browser functions will be available only after their forced activation (that is, everything is disabled by default). For me, this is overkill, so I left everything as it was, but you can choose something in the middle (compromise).

Otherwise Tor Browser is similar to Mozilla Firefox, because in fact it is assembled on its basis. This will be clearly seen when you go to the settings (by clicking on the button with three horizontal lines in the upper right corner):

Good luck to you! See you soon on the pages of the blog site

you can watch more videos by going to
");">

You may be interested

Search and views history in Yandex - how to open and view it, and, if necessary, clear or delete
Incognito - what is it and how to enable incognito mode in Yandex browser and Google Chrome How to make the main page of Yandex or Google the start page, as well as set any page (for example, this one) as home

You need to change some of your habits, as some things won "t work exactly as you are used to. Please read the for details.

Microsoft Windows

Expert Bundle

Windows 10, 8, 7, Vista, XP, 2000, 2003 Server, ME, and Windows 98SE

Contains just Tor and nothing else. You "ll need to configure Tor and all of your applications manually. This installer must be run as Administrator.

Apple OS X

Linux

Android

The current unstable / alpha version of Tor is 0.4.0.2-alpha. Its is available.

  • Don "t open documents downloaded through Tor while online

    Tor Browser will warn you before automatically opening documents that are handled by external applications. DO NOT IGNORE THIS WARNING... You should be very careful when downloading documents via Tor (especially DOC and PDF files, unless you use the PDF viewer that "s built into Tor Browser) as these documents can contain Internet resources that will be downloaded outside of Tor by the application that opens them. This will reveal your non-Tor IP address. If you must work with DOC and / or PDF files, we strongly recommend either using a disconnected computer, downloading the free VirtualBox and using it with a virtual machine image with networking disabled, or using Tails. Under no circumstances is it safe to use together, however.

  • Use bridges and / or find company

    Tor tries to prevent attackers from learning what destination websites you connect to. However, by default, it does not prevent somebody watching your Internet traffic from learning that you "re using Tor. If this matters to you, you can reduce this risk by configuring Tor to use a Tor bridge relay rather than connecting directly to the public Tor network. Ultimately the best protection is a social approach: the more Tor users there are near you and the more diverse their interests, the less dangerous it will be that you are one of them. Convince other people to use Tor, too!

  • Be smart and learn more. Understand what Tor does and does not offer. This list of pitfalls isn "t complete, and we need your help

    For anonymous web surfing. It is a Firefox web browser with an integrated Torbutton extension, a script blocker and an add-on for entering sites via HTTPS.

    The program allows you to visit websites prohibited by the administrator or the state, as well as to correspond in web-chats, place orders and download files, hiding your IP-address and other identification elements.

    A proxy server system called "Tor" was created by employees of the US Navy Research Laboratory. After the US Department of Defense decided to declassify the project, transferring it to the status of Open Source (open source code), a group of independent developers took up its development. As a result, more than 6,000 communication nodes have appeared on various continents, providing ultra-encrypted data transmission via Tor anonymous proxy servers.

    The app works without installation. That is, you can download it to your computer and then copy it to a USB device and run it on another PC.

    Upon launch, a slightly redesigned Firefox browser opens. It almost does not differ from a standard browser, except that it allows you to access the Internet anonymously - using encrypted virtual tunnels between Tor communication nodes. Thus, the user gets the long-awaited opportunity to visit sites that were previously blocked at the level of the employing company, Internet provider or the state in general. At the same time, neither other users, nor bots, nor special utilities will be able to track his location or "read" any data about his laptop or stationary PC.

    Opportunities:

    • protection against surveillance on the web;
    • blocking flash content, which is often a security threat;
    • auto-delete cookies, history and cache in the browser;
    • hiding equipment configuration from visited hosts;
    • forced use of the HTTPS protocol.

    Advantages:

    • it is possible to download the Tor Browser in Russian;
    • does not require special settings - ready to use after launch;
    • provides access to prohibited sites;
    • guarantees online privacy;
    • Tor Browser runs without installation (including from a flash drive or memory card).

    Things worth working on:

  • does not support flash content playback.
  • According to the developers, Russia ranks third in terms of the number of users who have installed Tor. The Russian version of Tor Browser will be understandable even for inexperienced users. You can work with the browser immediately after launching - everything is already provided for anonymous surfing.

    The program is intended for users who want to protect their privacy, ensure the confidentiality of Internet surfing, as well as gain access to web pages prohibited by Internet censorship. Allows you to create sites or blogs and not disclose information about the location of the authors.

    Privacy settings

    Tor Browser 7.0.6 in Russian for Windows

    To maintain complete anonymity on the network, there are different ways, but, as a rule, for this you need to install 1-2, or even more programs, add-ons, etc. Tor browser, which can be downloaded for free, already includes everything you need. The browser is built on the basis of another popular Internet browser, Mozilla Firefox.

    Tor provides its users with complete anonymity, which means that it is impossible to establish the location, the real IP or which sites are being viewed at the moment. In addition, after the session ends, the browser cleans all history, cookies and other files, so that no trace remains. The program gives all this for free, you just need to download Tor Browser and install it on your computer.

    Thanks to the Tor browser, you can access any sites and resources, for example, those that are blocked in your country. The built-in Vidalia utility will help to do this, in which you can change the IP, manage the current session, and also enable traffic relay so that no one can track you.

    It is worth listing the main advantages of the program:

    • Complete anonymity when surfing
    • Full Russification of the browser
    • Portability, i.e. it is not necessary to install
    • Availability. Tor Browser is absolutely free to download
    • Nice interface

    But there are also several significant disadvantages:

    • Low connection speed
    • Lack of protection. Since Thor is used not only by ordinary people, but also, for example, by hackers, we can say that all the "doors" are open for them.

    The most famous browser among Internet users concerned about their privacy is Tor. Cross-platform software developed in 2002 and implemented using programming languages: C, C ++, Python. It is distributed free of charge and operates using a hybrid anonymous network - onion routing. The project is actively developing. Another update was released on July 26, 2018.

    Priority benefits

    The main purpose of the well-known web navigator is to guarantee cyberspace users high anonymity on the network when visiting sites, sending various messages, blogging and other actions provided for by the TCP protocol. Another important factor in the popularity of the "onion" is the chance to travel across the vastness of the deep Internet. Only with the help of the above browser can you easily get into the darknet and keep your privacy.

    The technological capabilities of the web navigator allow:

    • transfer information in encrypted form;
    • keep your privacy online;
    • change the IP address;
    • protect traffic analysis;
    • achieve confidentiality of personal contacts, messages;
    • contact anonymous, pseudo-anonymous addresses through the onion domain.

    The browser has received an EFF Award from the Electronic Frontier Foundation and an FSF Award - Free Software Foundation.

    Purpose of use

    The browser was created under the patronage of the US Navy with the active participation of the Center for Computing and Advanced Research Projects of the United States. The project was called FreeNaven and was published in the public domain. Any cyberspace user could test the new web navigator for bugs and vulnerabilities.

    The browser is not positioned for high speed. Due to the complex system of connections that provides anonymity on the web, pages on the Internet open more slowly than in conventional web browsers. Meanwhile, users effectively use the onion for a variety of actions:

    • get access to closed web resources;
    • design popular sites;
    • create electronic media with a hidden real location;
    • exchange classified information, compromising evidence.

    Intelligence agencies use the navigator for their own purposes, and international corporations to analyze competitive markets. The project is actively supported by all kinds of organizations advocating for free cyberspace and respect for civil rights.

    Integrated capabilities

    The web browser is developed based on one of the versions of MozillaFirefox. For many users who are not familiar with the onion, but have gained sufficient experience using the fox, the upcoming acquaintance with Tor will be very pleasant. Key features.

    • User-friendly interface.
    • Intuitive settings;
    • Timely prompts function;
    • Convenient omnibox;
    • Various search engines (by default –DuckDuckGo is assigned).
    • Access to frequently visited sites;
    • Quick change of identity (IP address);
    • Applying bookmarks.

    The web navigator is compatible with common operating systems, has great functionality, and each user can customize the browser to suit his preferences.

    One of the main advantages of an onion is hints. They are very useful for beginners who are not familiar with the basic principles of the browser.

    Top related articles