Welcome to the exciting world of Tor! This page will get you up and running, in the fewest steps possible. For now, all you need to know is that Tor is a great tool for anonymity and privacy online.
The first step is to download Tor. The Tor project offers quite a few packages for download, start with picking the “Tor Browser Bundle” for your operating system.
Once you have downloaded the Tor Browser Bundle, proceed to follow the instructions below, depending on your operating system.
After you’ve downloaded the Tor Browser Bundle, then double click on it to run it. Click on the button labeled “…” (1) and select where you want to save the bundle then click OK (2). At least 50 MB free space must be available in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk. Then Click Extract (3) to begin extraction. This may take a few minutes to complete.
See the Using Tor section below for how to use Tor.
After you’ve downloaded the Tor Browser Bundle, then simply click on it to begin the installation. Mac OS X will automatically unarchive it and you will have a TorBrowser application in your chosen language (for example, TorBrowser_en-US.app). Click the TorBrowser application to launch Vidalia. Once Vidalia connects to Tor, it will launch Firefox.
See the Using Tor section below about how to use Tor.
Download the architecture-appropriate file above, save it somewhere. To extract the files you may use graphical tools like archive manager, Ark or Xarchiver. Alternatively you can extract on the command line:
- For 32-bit Linux:
tar -xvzf tor-browser-linux32-4.0.1_LANG.tar.gz
- For 64-bit Linux:
tar -xvzf tor-browser-linux64-4.0.1_LANG.tar.gz
(where LANG is the language listed in the filename), and either double click on the directory or cd into it, then execute the start-tor-browser script. This will launch Vidalia and once that connects to Tor, it will launch Firefox. Do not unpack or run TBB as root.
Linux users might also be interested in torbrowser-launcher. This script ensures your Tor Browser Bundle is kept up to date.
Don’t extract TBB as root.
Once extraction is complete, open the folder Tor Browser from the location you saved the bundle. Double click on the Start Tor Browser (4) application (it may be called Start Tor Browser.exe on some systems) The Vidalia window will shortly appear.
Once Tor is ready, Firefox will automatically be opened. Only web pages visited through the included Firefox browser will be sent via Tor. Other web browsers such as Internet Explorer are not affected. Make sure that it says “Tor Enabled” (5) in the bottom right corner before using it. To reduce the risk of confusion, don’t run your normal Firefox while using the Tor Browser Bundle, its better to close existing Firefox windows before starting.
Once you are finished browsing, close any open Firefox windows by clicking on the ‘x’ (6). For privacy reasons, the list of web pages you visited and any cookies will be deleted.
With the Tor Browser Bundle, Vidalia and Tor will automatically close.
Tor makes it possible for not just users to hide their locations, but servers as well. You can access Riseup’s services via our Tor Hidden Service addresses. Whenever you see a URL that ends with .onion, that’s a Tor hidden service. If you are running Tor, you can simply put that onion address where you would normally put the regular address (for example, as a URL in your Tor enabled web browser) and it will use the Tor network to get to our servers.
The following is a list of Riseup’s Tor hidden services. If you have trouble verifying this, try downloading and verifying this file:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 riseup.net: nzh3fv6jc6jskki3.onion (port 80) help.riseup.net: nzh3fv6jc6jskki3.onion (port 80) black.riseup.net: cwoiopiifrlzcuos.onion (port 80) imap.riseup.net: zsolxunfmbfuq7wf.onion (port 993) lists.riseup.net: xpgylzydxykgdqyg.onion (port 80) mail.riseup.net: zsolxunfmbfuq7wf.onion (ports 80, 465, 587) mx1.riseup.net: wy6zk3pmcwiyhiao.onion (port 25) pad.riseup.net: 5jp7xtmox6jyoqd5.onion (port 80) pop.riseup.net: zsolxunfmbfuq7wf.onion (port 995) share.riseup.net: 6zc6sejeho3fwrd4.onion (port 80) smtp.riseup.net: zsolxunfmbfuq7wf.onion (ports 465, 587) user.riseup.net: j6uhdvbhz74oefxf.onion (port 80) we.riseup.net: 7lvd7fa5yfbdqaii.onion (port 443) xmpp.riseup.net: 4cjw6cwpeaeppfqz.onion (ports 5222, 5269) 0xacab.org vivmyccb3jdb7yij.onion (port 80) -----BEGIN PGP SIGNATURE----- iQJ8BAEBCgBmBQJYXYrpXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ0RTA3OTEyNjhGN0M2N0VBQkU4OEYxQjAz MDQzRTJCNzEzOUE3NjhFAAoJEDBD4rcTmnaO2vQP/RTXNnbGrSZLWQ4hHCHxx9Th 0nptrHb4l2/5kCyqxfODKhUxxP5PZxTR9/uyjmzK19sLxIAoJaXObn+GRqRwXiot oqhqZZca2iYdpdVfLmD6n/c2oPVtmMOid1frFcm34u2B7vP7BNbgi2pkrTKqu2PG B1OUBk6aTxaFxxyGfFtzZmfnvGB0Ml/vcSfuutFVvS3OKxFGAekkHAQzZynHnzf9 sefuNmaHXXx8ekkq2pTEL08lvGVT6C2D06KXtD5PC9x7UJRg53Af2AreOa9vBm+i oFMd6x7RGy6ilctqUIAh7u15k49mQkJLKYd5oMlcgoxDjqJLUT0rBRsAzbR9xMNw 498U7GTWtvrBY4qNTUSzIbF4bMkilQLqLW02BWkwomiMa3X/BWjGKZpMrrQBxMl5 yRY4cpo9TSN5U91ZrTOwVF9sHEt5Bb5icYqIBSCOU1pcGL9S+PKnoFrRGGVasZ4C lCxebeiSsnUvfuMp62U8L/hSSkbLA1uU8P3D/9PCwfueaO8MNrV/O+fx5x4ySSsN 19BZqBg6nJsDX0aSmgtJHumL7IAPOwN3YF/YqQD2hS94uahkatnvD8Sw8dvpaIvx N0A6vv7Kf7refrrBSdlA8EZ036dbxXh55mIKUKzhsZQ+gS/3XrxwN8Zoty67js9U HEPWougabc1W+pEhDK60 =ALk6 -----END PGP SIGNATURE-----
First, be aware: Tor can be very slow, sometimes you wont notice that it is slow, but other times you will think that things aren’t working at all. The experience varies as Tor changes how your connection is routed. This is because your connection is being routed through at LEAST three computers. If two of those computers are blazing fast, but the third is a snail, your data will only move as fast as the snail can handle.
Second, while Tor itself may be quite secure, other software on your computer may not be. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. Further information is available at the Tor Project website, in their documentation section. Please read this information carefully before doing anything potentially unsafe on the Tor system.
Some text in this document is transposed from the Tor Project’s website via Creative Commons Attribution 3.0.
- The Surveillance Self Defense project over at the Electronic Frontier Foundation is a plethora of helpful and interesting information. Especially relevant is their Tor page.
- The Tor Project’s website will be able to answer almost all of your questions concerning the Tor project, and how to use the software effectively.