Welcome to the exciting world of Tor! This page will get you up and running, in the fewest steps possible. For now, all you need to know is that Tor is a great tool for anonymity and privacy online.
The first step is to download Tor. The Tor project offers quite a few packages for download, start with picking the “Tor Browser Bundle” for your operating system.
Once you have downloaded the Tor Browser Bundle, proceed to follow the instructions below, depending on your operating system.
After you’ve downloaded the Tor Browser Bundle, then double click on it to run it. Click on the button labeled “…” (1) and select where you want to save the bundle then click OK (2). At least 50 MB free space must be available in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk. Then Click Extract (3) to begin extraction. This may take a few minutes to complete.
See the Using Tor section below for how to use Tor.
After you’ve downloaded the Tor Browser Bundle, then simply click on it to begin the installation. Mac OS X will automatically unarchive it and you will have a TorBrowser application in your chosen language (for example, TorBrowser_en-US.app). Click the TorBrowser application to launch Vidalia. Once Vidalia connects to Tor, it will launch Firefox.
See the Using Tor section below about how to use Tor.
Download the architecture-appropriate file above, save it somewhere. To extract the files you may use graphical tools like archive manager, Ark or Xarchiver. Alternatively you can extract on the command line:
- For 32-bit Linux:
tar -xvzf tor-browser-linux32-4.0.1_LANG.tar.gz
- For 64-bit Linux:
tar -xvzf tor-browser-linux64-4.0.1_LANG.tar.gz
(where LANG is the language listed in the filename), and either double click on the directory or cd into it, then execute the start-tor-browser script. This will launch Vidalia and once that connects to Tor, it will launch Firefox. Do not unpack or run TBB as root.
Linux users might also be interested in torbrowser-launcher. This script ensures your Tor Browser Bundle is kept up to date.
Don’t extract TBB as root.
Once extraction is complete, open the folder Tor Browser from the location you saved the bundle. Double click on the Start Tor Browser (4) application (it may be called Start Tor Browser.exe on some systems) The Vidalia window will shortly appear.
Once Tor is ready, Firefox will automatically be opened. Only web pages visited through the included Firefox browser will be sent via Tor. Other web browsers such as Internet Explorer are not affected. Make sure that it says “Tor Enabled” (5) in the bottom right corner before using it. To reduce the risk of confusion, don’t run your normal Firefox while using the Tor Browser Bundle, its better to close existing Firefox windows before starting.
Once you are finished browsing, close any open Firefox windows by clicking on the ‘x’ (6). For privacy reasons, the list of web pages you visited and any cookies will be deleted.
With the Tor Browser Bundle, Vidalia and Tor will automatically close.
Tor makes it possible for not just users to hide their locations, but servers as well. You can access Riseup’s services via our Tor Hidden Service addresses. Whenever you see a URL that ends with .onion, that’s a Tor hidden service. If you are running Tor, you can simply put that onion address where you would normally put the regular address (for example, as a URL in your Tor enabled web browser) and it will use the Tor network to get to our servers.
The following is a list of Riseup’s Tor hidden services. If you have trouble verifying this, try downloading and verifying this file:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 riseup.net: nzh3fv6jc6jskki3.onion (port 80) help.riseup.net: nzh3fv6jc6jskki3.onion (port 80) black.riseup.net: cwoiopiifrlzcuos.onion (port 80) imap.riseup.net: zsolxunfmbfuq7wf.onion (port 993) lists.riseup.net: xpgylzydxykgdqyg.onion (port 80) mail.riseup.net: zsolxunfmbfuq7wf.onion (ports 80, 465, 587) pad.riseup.net: 5jp7xtmox6jyoqd5.onion (port 80) pop.riseup.net: zsolxunfmbfuq7wf.onion (port 995) share.riseup.net: 6zc6sejeho3fwrd4.onion (port 80) smtp.riseup.net: zsolxunfmbfuq7wf.onion (ports 465, 587) user.riseup.net: j6uhdvbhz74oefxf.onion (port 80) we.riseup.net: 7lvd7fa5yfbdqaii.onion (port 443) xmpp.riseup.net: 4cjw6cwpeaeppfqz.onion (ports 5222, 5269) 0xacab.org vivmyccb3jdb7yij.onion (port 80) -----BEGIN PGP SIGNATURE----- iQJ8BAEBCgBmBQJXaqUFXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ0RTA3OTEyNjhGN0M2N0VBQkU4OEYxQjAz MDQzRTJCNzEzOUE3NjhFAAoJEDBD4rcTmnaORtUP/jVtybS/00CFpvhaucoZxsE5 Jid2RH31gT8fo7SDhNDRxddWvYpX+P82IT8eWPFlHJ1DrJXpuil1wYlUTSV3p2gg cCA7/fvcvZLySWyJXczDppCSiiJIOW/9x2OrdpmVEbCj2UpxzoLBcoZe5Hh43qoL xfoI3WFNcywCCmixJti+Ss333PQlu9sbLp5YB4sqIXtAe/uuAHcdfvPB8rDJ0b1D uL4voMQDJOPg+DhMkGSh7SdyJrN3w2KbbXarJGzk9zznxKa/UqlHctrQ59Gud70X E0fDvaTyan2ftdxLoonvZT7UtrrbHfmFXQZgO+IYzlcew2vyEBnCNmmaRCWTKveH tPPEKn0XBYw9GG07nYKfcrdFtkXGZnkKvMJaYZYrXi168FZnCbe0SxIk7pF+ECEE +3Id22yw1NTpLBGZ3qPnAdxX5zfYtnM6x2NMMmW53+Vr5juq1HDKVcphViGt0G3C sa+bH+Icx4DphX3D6zwGpXTKPGCgl9dtiW5OjjH/N0EFtou2+BObSTJkiDG07B/T u0hi+LSvpT81evQWZTgRyIB/AuEMSMQwGqA7jW1q0y/5FJX1ixIVSGpRJbNROGWM YXU5nq7Yyt12zlyxP/AWkzSlajMO63n8dCBVP3j3fP+r/45rTjLAkm4VEHBYlkEc M8MwXkNpi2/6PyrJwLTb =aOl1 -----END PGP SIGNATURE-----
First, be aware: Tor can be very slow, sometimes you wont notice that it is slow, but other times you will think that things aren’t working at all. The experience varies as Tor changes how your connection is routed. This is because your connection is being routed through at LEAST three computers. If two of those computers are blazing fast, but the third is a snail, your data will only move as fast as the snail can handle.
Second, while Tor itself may be quite secure, other software on your computer may not be. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. Further information is available at the Tor Project website, in their documentation section. Please read this information carefully before doing anything potentially unsafe on the Tor system.
Some text in this document is transposed from the Tor Project’s website via Creative Commons Attribution 3.0.
- The Surveillance Self Defense project over at the Electronic Frontier Foundation is a plethora of helpful and interesting information. Especially relevant is their Tor page.
- The Tor Project’s website will be able to answer almost all of your questions concerning the Tor project, and how to use the software effectively.