Welcome to the exciting world of Tor! This page will get you up and running, in the fewest steps possible. For now, all you need to know is that Tor is a great tool for anonymity and privacy online.
The first step is to download Tor Browser. The Tor Project offers quite a few packages for download, start with picking the “Tor Browser package” for your operating system.
At the time of this being written, the Tor Browser only supports Windows, Mac OS X, Linux, and Android. For iOS users, “Onion Browser” is a free and open source alternative to Tor Browser encouraged for use by the Tor Project.
Once you have downloaded the Tor Browser, proceed to follow the instructions below, depending on your operating system.
After you’ve downloaded the Tor Browser installer, double click on the installer to start the installation process. Choose your language and select where you want to save the bundle to then click “OK”. At least 181 MB free space must be available in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk. Once finished, make sure that you check the box labeled “Add Start Menu & Desktop shortcuts” (1) for an easy way to start the browser.
See the Using Tor section below for how to use Tor.
After you’ve downloaded the Tor Browser Bundle, simply click on it to begin the installation. Mac OS X will automatically unarchive it and you will have a TorBrowser application in your chosen language (for example, TorBrowser_en-US.app). Click the TorBrowser application to launch the connection wizard. Once connected to Tor, it will launch Tor Browser.
See the Using Tor section below about how to use Tor.
Download the architecture-appropriate file, save it somewhere such as “~/Downloads”. To extract the files you may use graphical tools like archive manager, Ark or Xarchiver. Alternatively you can extract on the command line:
- For 32-bit Linux:
tar -xvzf ~/Downloads/tor-browser-linux32-X.X.X_LANG.xz
- For 64-bit Linux:
tar -xvzf ~/Downloads/tor-browser-linux64-X.X.X_LANG.xz
X.X.X being the version of the browser archive and LANG being the language you are using. For example, if you are installing Tor Browser version 9.0.5 for the english language on a 64-bit machine, you would use “tor-browser-linux64-9.0.5_en-US.xz” as the file name.
Once extracted, navigate inside the new folder created by the extraction, then to “tor-browser-linux64-9.0.5_en-US/tor-browser_en-US/” There you will find a file named Tor Browser (this sometimes end in .desktop). Double click the file and you will be at the connection wizard.
Linux users may prefer “torbrowser-launcher”. This tool ensures your Tor Browser is legitimate and up to date in an easy manner.
If you are not able to execute or if you do not see a “Tor Browser” file, cd into the directory where the “Tor Browser” file should be and execute
chmod +x start-tor-browser.desktop && ./start-tor-browser.desktop
Don’t extract Tor Browser as root.
Tor Browser is avaliable for download from the “Google Play store” and as an APK file. Install the application from the Play Store or download or manually install the APK file if you do not wish to use the Play Store.
Once extraction or installation is complete, you can type “Tor Browser” from your Windows start menu then click on the Start Tor Browser (2) application (it may be called Start Tor Browser.exe on some systems) or click on the newly created desktop icon. If you are using Linux or Mac OS X, you will need to navigate to the extracted Tor Browser directory and double click on “Start Tor Browser” (this sometimes can end in “.desktop” on Linux).
Once Tor is ready, Tor Browser will open a menu with buttons “Connect” and “Configure”. Unless you live in an oppressive state that censors internet or if you would like to use a proxy to connect to the Tor network, this can be ignored. Once “Connect” is clicked, Tor will establish a connection and will automatically open a Firefox like web browser. Only web pages visited through Tor Browser will be sent via Tor. Other web browsers such as Google Chrome and Firefox are not affected by Tor. Before browsing, it is a good idea to ensure you are connected to the Tor network. To reduce the risk of confusion, don’t run the normal Firefox web browser while using the Tor Browser, as its better to close existing Firefox windows before starting.
Once you are finished browsing, you can close out of the browser like you normally would. For privacy reasons, the list of web pages you visited and any cookies will be deleted.
Tor makes it possible for not just users to hide their locations, but servers as well. You can access Riseup’s services via our Tor Onion Service addresses. Whenever you see a URL that ends with .onion, that’s a Tor onion service. If you are running Tor, you can simply put that onion address where you would normally put the regular address (for example, as a URL in your Tor enabled web browser) and it will use the Tor network to get to our servers.
The following is a list of Riseup’s Tor onion services. If you have trouble verifying this, try downloading and verifying this file:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Riseup now supports v3 hidden/onion services. These are faster, and more secure, and have a longer .onion address. We are supporting both versions of hidden services until we can safely remove the old versions. If you are using tor version greater or equal to 0.3.2, or Tor Browser version 7.5 or later, you should use the longer .onion, if it is listed. riseup.net: nzh3fv6jc6jskki3.onion (port 80) vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion (port 80) help.riseup.net: nzh3fv6jc6jskki3.onion (port 80) vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion (port 80) black.riseup.net: cwoiopiifrlzcuos.onion (port 80) imap.riseup.net: zsolxunfmbfuq7wf.onion (port 993) 5gdvpfoh6kb2iqbizb37lzk2ddzrwa47m6rpdueg2m656fovmbhoptqd.onion (port 993) lists.riseup.net: xpgylzydxykgdqyg.onion (port 80) 7sbw6jufrirhyltzkslhcmkik4z7yrsmbpnptyritvz5nhbk35hncsqd.onion (port 80) mail.riseup.net: zsolxunfmbfuq7wf.onion (ports 80, 465, 587) 5gdvpfoh6kb2iqbizb37lzk2ddzrwa47m6rpdueg2m656fovmbhoptqd.onion (ports 80, 465, 587) sm.riseup.net: mzozzdejacxpb7boq4m7smisoa3bi4knpydntjbvyjrgzonmrhkbsjqd.onion (port 80) mx1.riseup.net: wy6zk3pmcwiyhiao.onion (port 25) aj3nsqqcksrrc5cye5etjsoewz6jrygpekzwoko3q6wyxjlb3dgasfid.onion (port 25) pad.riseup.net: 5jp7xtmox6jyoqd5.onion (port 80) kfahv6wfkbezjyg4r6mlhpmieydbebr5vkok5r34ya464gqz6c44bnyd.onion (port 80) pop.riseup.net: zsolxunfmbfuq7wf.onion (port 995) 5gdvpfoh6kb2iqbizb37lzk2ddzrwa47m6rpdueg2m656fovmbhoptqd.onion (ports 995) share.riseup.net: 6zc6sejeho3fwrd4.onion (port 80) zs7xwvcspvnnrqhvyxyxpjkihc4lva3yustfr75j6giy24mdfg3rcwqd.onion (port 80) smtp.riseup.net: zsolxunfmbfuq7wf.onion (ports 465, 587) 5gdvpfoh6kb2iqbizb37lzk2ddzrwa47m6rpdueg2m656fovmbhoptqd.onion (ports 465, 587) account.riseup.net: j6uhdvbhz74oefxf.onion (port 80) 3xeiol2bnhrsqhcsaifwtnlqkylrerdspzua7bcjrh26qlrrrctfobid.onion (port 80) we.riseup.net: 7lvd7fa5yfbdqaii.onion (port 443) zkdppoahhqu5ihjqd4qqvyfd2bm4wejrhjosim67t6yopl77jitg2nad.onion (port 443) xmpp.riseup.net: 4cjw6cwpeaeppfqz.onion (ports 5222, 5269) jukrlvyhgguiedqswc5lehrag2fjunfktouuhi4wozxhb6heyzvshuyd.onion (ports 5222, 5269) 0xacab.org wmj5kiic7b6kjplpbvwadnht2nh2qnkbnqtcv3dyvpqtz7ssbssftxid.onion (port 80) -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEETgeRJo98Z+q+iPGwMEPitxOado4FAl5G9ypfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDRF MDc5MTI2OEY3QzY3RUFCRTg4RjFCMDMwNDNFMkI3MTM5QTc2OEUACgkQMEPitxOa do7DSw//eWxedpEybGMI2AJ91YJ34E35alFx5t/47Zu6yaIwS6ljMpw9q3pR4TcR 6RWMxmuc9qN9fpsbpbirI06URBtT3KxE9Fr7P4X9rlW59Dm2DNUbhiiFa49SL4bg GbDpKwHcttY4ILMliSKVNP7h9SDxA44NJA8Y89Lx/Zkf30DD5E9IiBN5B6OkJ00L 7cY/IIkaSsz7yyObVwezVWuzXku92B7IRbKAIPEo+pk2ANdzfoY/bGf7ucl5qIxp 6o/P5BahFIPsUL0weo4gjrtnzO5e6N4UCMAhw3X8cr/Y79rz32SO0SU9ufCWs/ZP FfiHZ0H0VzP1HkdzdXT0dfLtHOjEbUxg1RbUkypDwU+8L0WJe1JTZm2xrYR2Z9d7 Bpj7++4VTzPoAdj+/tPQViPmu2hO5+6PgEbZIuKQtzdg4g5Sb5U696gMVyhko1U2 pLeA3jpz8RVcMYLjsAZ5If4PMrVmMNRolr/Do2h8mGl5XbsJ8Faxyyz7sVYczEps Nrx0uhbEeEQa28n4NhGtVQexGoNxG6YHoHR86hUSOod+9XyvWct0IDM+rbpJlITB 2y8LKe+GxOQ1PTj5wWrqI3jaFZ/qfKX71j+3VvZA3/VQIksfOluS7sIffJtp+j5P gEBMB2llMFX9DJD9cehXR7HpLQLSseabjtfVlYCb73426OcBbOQ= =b6Tz -----END PGP SIGNATURE-----
First, be aware: Tor can be very slow, sometimes you wont notice that it is slow, but other times you will think that things aren’t working at all. The experience varies as Tor changes how your connection is routed. This is because your connection is being routed through at LEAST three computers. If two of those computers are blazing fast, but the third is a snail, your data will only move as fast as the snail can handle.
Second, while Tor itself may be quite secure, other software on your computer may not be. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. Further information is available at the Tor Project website, in their documentation section. Please read this information carefully before doing anything potentially unsafe on the Tor system.
Third, you don’t need SSL/TLS in an onion address (ie. https) since it’s a complete encrypted tunnel with perfect forward secrecy. Because it doesn’t hurt having extra protections, you can still connect using the SSL/TLS protected channels, just be aware that the certificate will not validate (because the hostname will be *.onion) and you would need to perform the validation manually.
Some text in this document is transposed from the Tor Project’s website via Creative Commons Attribution 3.0.
- The Surveillance Self Defense project over at the Electronic Frontier Foundation is a plethora of helpful and interesting information. Especially relevant is their Tor page.
- The Tor Project’s website will be able to answer almost all of your questions concerning the Tor project, and how to use the software effectively.