What is TOR browser? How to set up and use it

Pin
Send
Share
Send

TOR is a browser configured in a certain way, which guarantees the anonymity of the Internet. The "incognito" mode is achieved by encrypting the traffic and further routing it through the servers. Using a browser can hide the user's identity and protect web connections from various types of surveillance. An additional TOR option is to bypass Internet blocking. Let's get acquainted with the capabilities and features of the browser.

TOR - what is it, advantages and disadvantages of technology

TOR is a tandem of the modern version of Mozilla Firefox and software with an emphasis on privacy. The program is free, allows you to effectively bypass censorship on the network. The browser network consists of many servers scattered around the world, run by volunteers.

Anonymity is ensured by connecting to three repeaters, each of which is encrypted. As a result, it becomes impossible to calculate the path from the movement of information from the recipient to the sender.

When using TOR, a different IP address is used, which often belongs to a different country. In this case, the IP address is hidden from the sites that the user visits. An additional security measure is the encryption of the visited sites from unauthorized persons who can intercept traffic traffic.

This reduces the risk of online surveillance to zero. TOR also allows you to bypass Internet filters. Sites and resources that were previously inaccessible due to internal blocking become available to the user.

Benefits of using:

  • protection against surveillance that can pose a threat to privacy;
  • lack of built-in tracking systems for the user;
  • simplicity of the system, even an inexperienced user can easily cope with the program;
  • technology does not benefit from user data;
  • the browser is recommended by many security experts;
  • dynamism of the program - you can run it from any type of media, including portable;
  • the browser blocks all network functions that could compromise security.

The use of TOR is not without its drawbacks. The main one is considered to be low download speed. At the same time, the user is limited in the possibilities of using all the functions of some of the resources.

Download and installation process

First you need to go to the official Tor Browser website - https://www.torproject.org. Click the download button, after which you will be presented with a table of different versions. Select the appropriate one and continue downloading. If the site is not available to you, you can send a request letter to [email protected]. Specify the required version, after which you will receive a download link that will not be blocked.

Tor does not require a standard installation procedure to use. You just need to unpack the browser on a PC and launch it from there. If you still want to install Tor, then follow these steps:

  • go to the "downloads" folder;
  • open the file, select the desired installation language;
  • select the program installation folder;
  • press "ok" and "done".

Installation completed. A shortcut appears on the desktop.

How to set up TOR for personal work?

During the first launch, the program will ask for the type of connection that must be selected. TOR offers 2 types of connection:

  1. direct connection - should be selected with unrestricted access to the network, in those countries where the browser is not prohibited by law, the use of the program is not monitored by the relevant services;
  2. limited connection - should be selected when access to the network is limited, for countries where the use of the browser is blocked or prohibited.

In the first case, you need to start the program and select the "connection" section. After that, the use of the browser will become available.

In the second case, it is necessary to additionally encrypt the TOR bridges. We select "limited access" and press the "settings" button. Now let's move on to configuring bridges. In the window that opens, select the "connect to predefined bridges" section. Next, the program will ask if you need a proxy to provide access to the network. We select the parameter "no". Then click on "connect".

An alternative is to choose the bridges yourself. This method is rarely used, so the probability that you will be blocked is minimal. The user needs to go to the Tor Project website and request the addresses of existing bridges. Then you just need to follow the instructions.

After receiving the information, you can personally type in the addresses of the bridges in the settings and use the browser.

Features of use

TOR is very easy to use. It is a classic browser with one important feature - privacy mode. You can also visit the resources and sites of interest without the threat of surveillance. However, questions may arise if, for example, you are traveling to a country where the use of TOR is prohibited. In this case, follow the steps:

  1. go to the browser menu;
  2. select connection settings;
  3. change the method of connecting to the Internet (see the section above about limited connections);
  4. after completing the settings, click "ok" and restart the program.

When using the technology, it is worth remembering that network activity will be protected only within the TOR browser. The program does not protect other online user activities. When visiting TOR, the history of operations is available only when you use the program. As soon as you exit it, the history will be automatically cleared without saving to the PC hard drive.

In order to check whether the browser is active, you need to visit the developer's site - https://check.torproject.org/. When using the program, you can create new personalities. This can be done in the settings menu. In doing so, the browser will select new repeaters that will ensure anonymity.

When using the network, it will look as if you have accessed the Internet under a different IP address. An additional security measure is the NoScript option. It is not active by default, but you can enable it.

Its activities are aimed at protecting the user from data leakage through scripts and protecting against potentially malicious sites. To activate it, you must press the characteristic icon, which is located to the left of the main menu key.

To work properly, the browser must be regularly updated. The user will receive notifications about this, but from time to time you need to review their availability yourself. This can be done in the "check for updates" section of the menu.

For what purposes do you use Tor Browser? Write in the comments!

Pin
Send
Share
Send

Watch the video: How To Download and Use Tor Browser on Windows 10. Tor Browser 2020 (May 2024).

essaisrff-com