Welcome to the exciting world of Tor! This page will get you up and running, in the fewest steps possible. For now, all you need to know is that Tor is a great tool for anonymity and privacy online.
The first step is to download Tor. The Tor project offers quite a few packages for download, start with picking the “Tor Browser Bundle” for your operating system.
Once you have downloaded the Tor Browser Bundle, proceed to follow the instructions below, depending on your operating system.
After you’ve downloaded the Tor Browser Bundle, then double click on it to run it. Click on the button labeled “…” (1) and select where you want to save the bundle then click OK (2). At least 50 MB free space must be available in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk. Then Click Extract (3) to begin extraction. This may take a few minutes to complete.
See the Using Tor section below for how to use Tor.
After you’ve downloaded the Tor Browser Bundle, then simply click on it to begin the installation. Mac OS X will automatically unarchive it and you will have a TorBrowser application in your chosen language (for example, TorBrowser_en-US.app). Click the TorBrowser application to launch Vidalia. Once Vidalia connects to Tor, it will launch Firefox.
See the Using Tor section below about how to use Tor.
Download the architecture-appropriate file above, save it somewhere. To extract the files you may use graphical tools like archive manager, Ark or Xarchiver. Alternatively you can extract on the command line:
- For 32-bit Linux:
tar -xvzf tor-browser-linux32-4.0.1_LANG.tar.gz
- For 64-bit Linux:
tar -xvzf tor-browser-linux64-4.0.1_LANG.tar.gz
(where LANG is the language listed in the filename), and either double click on the directory or cd into it, then execute the start-tor-browser script. This will launch Vidalia and once that connects to Tor, it will launch Firefox. Do not unpack or run TBB as root.
Linux users might also be interested in torbrowser-launcher. This script ensures your Tor Browser Bundle is kept up to date.
Don’t extract TBB as root.
Once extraction is complete, open the folder Tor Browser from the location you saved the bundle. Double click on the Start Tor Browser (4) application (it may be called Start Tor Browser.exe on some systems) The Vidalia window will shortly appear.
Once Tor is ready, Firefox will automatically be opened. Only web pages visited through the included Firefox browser will be sent via Tor. Other web browsers such as Internet Explorer are not affected. Make sure that it says “Tor Enabled” (5) in the bottom right corner before using it. To reduce the risk of confusion, don’t run your normal Firefox while using the Tor Browser Bundle, its better to close existing Firefox windows before starting.
Once you are finished browsing, close any open Firefox windows by clicking on the ‘x’ (6). For privacy reasons, the list of web pages you visited and any cookies will be deleted.
With the Tor Browser Bundle, Vidalia and Tor will automatically close.
Tor makes it possible for not just users to hide their locations, but servers as well. You can access Riseup’s services via our Tor Onion Service addresses. Whenever you see a URL that ends with .onion, that’s a Tor onion service. If you are running Tor, you can simply put that onion address where you would normally put the regular address (for example, as a URL in your Tor enabled web browser) and it will use the Tor network to get to our servers.
The following is a list of Riseup’s Tor onion services. If you have trouble verifying this, try downloading and verifying this file:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Riseup now supports v3 hidden/onion services. These are faster, and more secure, and have a longer .onion address. We are supporting both versions of hidden services until we can safely remove the old versions. If you are using tor version greater or equal to 0.3.2, or Tor Browser version 7.5 or later, you should use the longer .onion, if it is listed. riseup.net: nzh3fv6jc6jskki3.onion (port 80) vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion (port 80) help.riseup.net: nzh3fv6jc6jskki3.onion (port 80) vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion (port 80) black.riseup.net: cwoiopiifrlzcuos.onion (port 80) imap.riseup.net: zsolxunfmbfuq7wf.onion (port 993) 5gdvpfoh6kb2iqbizb37lzk2ddzrwa47m6rpdueg2m656fovmbhoptqd.onion (port 993) lists.riseup.net: xpgylzydxykgdqyg.onion (port 80) 7sbw6jufrirhyltzkslhcmkik4z7yrsmbpnptyritvz5nhbk35hncsqd.onion (port 80) mail.riseup.net: zsolxunfmbfuq7wf.onion (ports 80, 465, 587) 5gdvpfoh6kb2iqbizb37lzk2ddzrwa47m6rpdueg2m656fovmbhoptqd.onion (ports 80, 465, 587) sm.riseup.net: mzozzdejacxpb7boq4m7smisoa3bi4knpydntjbvyjrgzonmrhkbsjqd.onion (port 80) mx1.riseup.net: wy6zk3pmcwiyhiao.onion (port 25) aj3nsqqcksrrc5cye5etjsoewz6jrygpekzwoko3q6wyxjlb3dgasfid.onion (port 25) pad.riseup.net: 5jp7xtmox6jyoqd5.onion (port 80) kfahv6wfkbezjyg4r6mlhpmieydbebr5vkok5r34ya464gqz6c44bnyd.onion (port 80) pop.riseup.net: zsolxunfmbfuq7wf.onion (port 995) 5gdvpfoh6kb2iqbizb37lzk2ddzrwa47m6rpdueg2m656fovmbhoptqd.onion (ports 995) share.riseup.net: 6zc6sejeho3fwrd4.onion (port 80) zs7xwvcspvnnrqhvyxyxpjkihc4lva3yustfr75j6giy24mdfg3rcwqd.onion (port 80) smtp.riseup.net: zsolxunfmbfuq7wf.onion (ports 465, 587) 5gdvpfoh6kb2iqbizb37lzk2ddzrwa47m6rpdueg2m656fovmbhoptqd.onion (ports 465, 587) account.riseup.net: j6uhdvbhz74oefxf.onion (port 80) 3xeiol2bnhrsqhcsaifwtnlqkylrerdspzua7bcjrh26qlrrrctfobid.onion (port 80) we.riseup.net: 7lvd7fa5yfbdqaii.onion (port 443) zkdppoahhqu5ihjqd4qqvyfd2bm4wejrhjosim67t6yopl77jitg2nad.onion (port 443) xmpp.riseup.net: 4cjw6cwpeaeppfqz.onion (ports 5222, 5269) jukrlvyhgguiedqswc5lehrag2fjunfktouuhi4wozxhb6heyzvshuyd.onion (ports 5222, 5269) 0xacab.org vivmyccb3jdb7yij.onion (port 80) -----BEGIN PGP SIGNATURE----- iQJKBAEBCgA0FiEETgeRJo98Z+q+iPGwMEPitxOado4FAlxbKiUWHGNvbGxlY3Rp dmVAcmlzZXVwLm5ldAAKCRAwQ+K3E5p2jmWiD/9zAqasGkdwPg1daVEaIve9JcQB ryZCP2EtA9dFrYDDLmB5gSkzYVHwZJ4dveZjF17qjmjp60rC7HHYhIOcXmttBuhs OhgUkJFr+DydvJa6DCVh+atXZ2Pp3GQlUCn0lJW7dej9Yq5leQ2sDG7DNfxXvYnV bQ97R3VETvWJPCYLai0ZnpUUoVH5wpXULZGrfzumX715Xo6jUga1C/cVFXsmSx4G Mt492LxQYXn0t767f2E9t9t0FJx8d13gczo27smsyiUMUBtRnStjIGw7lVP9cOnF UdTfuJIvC8ZFByDk6lQFGGWUojs/d4UpqquYYOmb0sW3EcgkGPx4KhSfu5Ose+ne uB349UHeDRNgjwRsSVwAS/C+BZZ1WrDDTasyPZLaACOnTEIq4BEd26edtBtasl7E E69kx/HBwcLiyIWa8acijLXihhDkfHBu1z2GXtTN5atEPVdIb6pQcViKUtVHSLQr PNLFu128S6mx0LMEmEk+n/1v7dN13V3qenWDkWTz7QZZx/F93DZK9h4XDZe5uJpT LK325lzt3wvzBlmMEY5YCf20N+EuFv14S6uO+yQW6yPAho0SKVFDM1UXZYHQJWA8 4LNfJLA7IU4OeoB987DB5Gd4DXKcc/Gh8yYCaxOtj/DUWSaMhtmAT+AHcAPuB7DM OJNMs4Ap9/c80+9DJA== =EqGH -----END PGP SIGNATURE-----
First, be aware: Tor can be very slow, sometimes you wont notice that it is slow, but other times you will think that things aren’t working at all. The experience varies as Tor changes how your connection is routed. This is because your connection is being routed through at LEAST three computers. If two of those computers are blazing fast, but the third is a snail, your data will only move as fast as the snail can handle.
Second, while Tor itself may be quite secure, other software on your computer may not be. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. Further information is available at the Tor Project website, in their documentation section. Please read this information carefully before doing anything potentially unsafe on the Tor system.
Third, you don’t need SSL/TLS in an onion address (ie. https) since it’s a complete encrypted tunnel with perfect forward secrecy. Because it doesn’t hurt having extra protections, you can still connect using the SSL/TLS protected channels, just be aware that the certificate will not validate (because the hostname will be *.onion) and you would need to perform the validation manually.
Some text in this document is transposed from the Tor Project’s website via Creative Commons Attribution 3.0.
- The Surveillance Self Defense project over at the Electronic Frontier Foundation is a plethora of helpful and interesting information. Especially relevant is their Tor page.
- The Tor Project’s website will be able to answer almost all of your questions concerning the Tor project, and how to use the software effectively.