Tor Browser for Windows – Online anonymity and censorship circumvention

Posted: March 8, 2017 at 12:55 pm

Posted10 August 2016

Tor Browser keeps your online activities private. It disguises your identity and protects your web traffic from many forms of internet surveillance. Tor can also be used to bypass internet filters.

Tor Browser is an up-to-date, privacy-optimised version of Mozilla Firefox. It is free and open source software that enables online anonymity and censorship circumvention. Unlike other browsers, Tor Browser:

The Tor Browser operates on the Tor network, which runs on Free and Open Source Software (FLOSS) and which is designed to enable online anonymity and censorship circumvention.

The Tor network consists of thousands of servers run by volunteers all over the world. Every time the Tor Browser makes a new connection, it selects three of these Tor relays and connects to the Internet through them. It encrypts each leg of this journey in such a way that the relays themselves do not know the full path through which it sends and receives data.

When you use the Tor Browser, your internet traffic will appear to come from a different IP address, often in a different country. As a result, the Tor Browser hides your IP address from the websites you access while also hiding the websites you access from third parties who might try to monitor your traffic. It also ensures that no single Tor relay can figure out both your location on the Internet and the websites you visit (though some of them will know one or the other).

Tor also takes steps to encrypt communications into and throughout its network. However, this protection does not extend all the way to websites that are accessible through unencrypted channels (that is, websites that do not support HTTPS).

Because the Tor Browser hides the connection between you and the websites you visit, it allows you to browse the Web anonymously and avoid online tracking. It it also useful for circumventing online filters so that you can access content from (or publish content to) websites that would otherwise be restricted.

The following steps illustrate how the Tor network works when Alice's computer uses Tor Browser to communicate with Bob's server:

Step 1. Alice's Tor Browser obtains a list of Tor nodes or relays [1] from the Tor directory server (Dave).

Step 2. Alice's Tor Browser picks a random path through Tor network to the destination server (Bob). All connections inside Tor network are encrypted (green [3]). In this example, the last connection is not-encrypted (red [2]). The last connection would be encrypted if Alice were visiting an https website.

Step 3. If at the later time, Alice visits another server (Jane), Alice's Tor Browser selects a different random path.

Note: There is a trade-off between anonymity and speed. Tor provides anonymity by bouncing your traffic through volunteer servers in various parts of the world. It will almost always be slower than a direct connection to the Internet.

Microsoft Windows, Mac OS, GNU/Linux, Android and iOS compatible programs:

The Tor Browser is available for the GNU Linux, Mac OS, Microsoft Windows and Android operating systems. Tor is the most rigorously tested tool for keeping your online activities anonymous. Below are a few other tools that are suitable for circumventing online censorship and protecting the confidentiality of your local traffic. Unlike Tor, these tools require that you trust the service provider:

Note: If you are in a location where access to the Tor Project website is blocked, you can use email to request a download link that is more likely to work. Send an email to gettor@torproject.org with the version you need (windows, osx or linux) in the body of the message. You will receive a response that includes a link to a Tor Browser archive via Dropbox, Google Docs or Github. Further details about this feature are available on the Tor Project website.

Start off by making sure you are on the Tor Browser download site. (The https indicates that the connection between your browser and the website is encrypted, which makes it harder for an attacker to modify the file that you are about to download.)

Figure 1: Tor Browser page

Step 1. Click [Download Tor Browser] to get directed to the bottom part of the page, which includes links for downloading Tor Browser.

Figure 2: Tor Browser download links

Step 2. Click the appropriate download link and save the package somewhere convenient (in your Desktop or Documents folder, for example, or on a USB storage device).

Step 3. Click [Save File] through the following window to start downloading Tor Browser:

Figure 3: Saving the Tor Browser file

You do not have to install the Tor Browser as you would most software. If you prefer, you can extract it to a USB storage device, for example, and run it from there.

To install the Tor Browser, follow the steps below:

Step 1. Navigate to the folder in which you saved the Tor Browser package. In this example, we assume you saved the file in your Downloads folder.

Figure 1: The Downloads folder containing the Tor Browser file

Step 2. Right-click on the Tor Browser file and then click [Open].

Figure 2: Opening the Tor Browser file

Step 3. Select the language you would like to use Tor Browser in and click [OK].

Figure 3: Tor Browser Language Installer

Step 4. Select the folder where you would like to install Tor Browser in. This example installs Tor Browser on the Desktop.

Figure 4: Tor Browser Installation Location

Step 5. Once you have chosen where you want to install Tor Browser, click [Install]. The following window should appear while Tor Browser is being installed:

Figure 5: Installing Tor Browser

Step 6. Click [Finish] through the following window, to complete the installation of Tor Browser:

Figure 5: Completing the Tor Browser Setup Wizard

By selecting [Run Tor Browser] in this window, you will proceed to running this browser.

The first time you launch Tor Browser, it will ask you how it should connect to the Internet:

Direct Access: Select this option if your access to the Internet is unrestricted and if the use of Tor is not blocked, banned, or monitored where you are located.

Restricted Access: Select this option if your access to the Internet is restricted or if the use of Tor is blocked, banned, or monitored where you are located.

After you initially configure and launch Tor Browser it will continue to connect to the Tor network with no additional configuration. But you can change these settings at any time from within the Tor Browser. You may need to change them when you are travelling, or if the situation changes in your country. To do so, see Section 3.3, How to reconfigure access to the Tor network.

Once you have installed Tor Browser, the Tor Browser Setup Wizard will direct you to the following window:

Figure 1: Tor Network Settings

If access to the internet (and to the Tor Network) is not restricted in your location, perform the following step to configure Tor Browser:

Step 1. Click [Connect] to launch Tor Browser

Figure 2: Connecting to the Tor Network

After a few moments, Tor Browser will open:

Figure 3: Tor Browser

If you want to use the Tor Browser from a location where the Tor network is blocked, you will have to use a bridge relay. Bridges are not listed in the public directory of Tor relays, so they are more difficult to block. Some bridges also support pluggable transports, which try to disguise your traffic to and from the Tor network. This helps prevent online filters from identifying and blocking bridge relays.

The default pluggable transport, called obfs4, also makes it slightly more difficult for others to figure out that you are connecting to the Tor network. In general, though, Tor is not designed to hide the fact that you are using Tor.

You can learn more about bridges on the Tor project website. There are two ways to use bridges. You can enable the provided bridges or you can request custom bridges.

Once you have installed Tor Browser, the Tor Browser Setup Wizard will direct you to the following window:

Figure 1: Tor Network Settings

Step 1. If your connection to the Tor network is blocked or otherwise censored, Click [Configure]

Note: If you have already configured the Tor Browser, you can activate the screen below by following the steps in Section 3.3

Figure 2: Tor bridges configuration

Step 2. Select Yes

Step 3. Click [Next] to display the bridge configuration screen.

Figure 3: The bridge configuration screen

Step 4. Select Connect with provided bridges.

Step 5. Click [Next] to display the local proxy configuration screen.

The Tor Browser will now ask if you need to use a local proxy to access the Internet. The steps below assume that you do not. If you do, you can check your regular browser settings and copy over your proxy configuration. (In Firefox you can find these settings in the Options > Advanced > Network tab of Connection Settings. In other browsers you might find them under Internet Options. You can also use the Help feature within your browser for further assistance.

Figure 4: The local proxy configuration screen

Step 6. Select [No].

Step 7. Click [Connect] to launch Tor Browser.

Figure 5: Connecting to the Tor network

After a few moments, Tor Browser will open.

You can also connect to the Tor network through custom bridges, which are used by fewer people than the provided bridges and are therefore less likely to be blocked. If you are unable to access the Tor Project website, you can request custom bridge addresses by sending an email to bridges@torproject.org using a Riseup, Gmail or Yahoo account. Include the phrase, get bridges in the body of your message

If you can access the Tor Project website, you can obtain custom bridge addresses by visiting https://bridges.torproject.org/options and following the steps below.

Step 1. Click Just give me bridges!

Figure 1: Obtaining Tor bridges

Step 2. Fill in the captcha and press enter.

Figure 2: Captcha

This should display three bridge addresses:

Figure 3: Bridge addresses

Step 3. Once you have your custom bridge addresses, you can type them into Tor Bridge Configuration screen shown below.

Note: If you are launching Tor Browser for the first time, you can find the Tor Bridge Configuration screen by follow the first few steps of the previous section. To find this screen if you have already setup Tor Browser, see the following section.

Figure 4: Tor bridge configuration screen

At any stage, if you need to access the Tor Network a different way, for example if you have travelled to a country that blocks Tor, you can update your settings from within the browser by following the steps below:

Step 1: Click the button to activate the Tor Browser menu

Figure 1: The Tor Browser Configuration menu

Step 2. Select Tor Network Settings to change how Tor Browser connects to the Internet.

Figure 2: Tor Network Settings

This screen allows you to enable or disable the use of Bridges and add custom Bridges, among other configuration changes.

When you are done, click [OK] and restart the Tor Browser.

It is important to remember that Tor Browser only provides anonymity for the things you do within a Tor Browser window. Your other online activities do not use Tor just because it is running.

Note: In keeping with a policy of privacy by design, Tor Browser is configured in such a way that it does not save your browsing history to your hard drive. Each time you quit Tor Browser, your browsing history will be deleted.

Tor Browser hides your IP address from the websites you visit. If it is working properly, you should appear to be accessing websites from a location on the internet that:

The simplest way to confirm this is by visiting the Tor Check website, which is located at https://check.torproject.org/.

If you are not using Tor, it will display the following:

Figure 1: Tor Check showing that Tor is not working properly

If you are using Tor, it will display the following:

Figure 2: Tor Check showing that Tor is working properly

If you want to check your apparent IP address using a service that is not associated with the Tor Project, there are many options online. Examples that support https encryption (which makes it more difficult for someone other than the service provider to "fake" the result) include:

If you access these websites without using Tor Browser, they should display your real IP address, which is linked to your physical location. If you access them through Tor Browser, they should display a different IP address.

You can create a "new identity" for your Tor Browser. When you do so, Tor Browser will randomly select a new set of Tor relays, which will make you appear to be coming from a different IP address when you visit websites.To do this, follow the steps below:

Step 1. Click the button to activate the Tor Browser menu

Figure 1: Creating a new identity in Tor Browser

Step 2. Select [New Identity] from the menu.

Read this article:
Tor Browser for Windows - Online anonymity and censorship circumvention

Related Posts