the Internet Windows Android

What is in the browser torus. Special services easily calculate the actual names of users TOR

If you are tired of the feeling of spying eyes, watching you for anything to sell something, then you have to find out what browser torus.

Personal information left by the user on social networks, online stores, on public organizations and simply in search engines, very interested in the same search companies. They handle custom preferences to improve their algorithms and improve the quality of issuing.

In addition, in the depths of the Internet, the hungry attackers are growing, who wishes to access your data bank cards and electronic wallets.

Marketers also contribute to the surveillance of your movements on the network: it is very important to know what you can sell, based on those requests that you continue to drive in search engines. It is only worth entering your mailbox, and there are already very important offers to go there and buy something, after studying at such courses, not free, of course.

One can only assume, but most likely, the special services are also interesting to your information, at least from the position of total control over the population, of course, for the sake of national security. After summarizing, the foregoing is a natural desire to avoid such tight attention surrounding simple user Internet. And this is exactly this opportunity and can provide you to the Thor Browser.

The Onion Router.

So what is Tor? Tor Browser is a free and open software whose name is an acronym from The Onion Router, and in Russian: a bulb router, or a bulb router. The name of the browser reflects the basic principles on which its encryption system is built written in the Python, C and C ++ programming languages. In general, the system is a network of proxy servers that establish an anonymous connection in the form of a virtual tunnel in which it is impossible to calculate the user's location, since data transmission occurs in an encrypted form.

By using an extensive system of servers, or information nodes, this browser allows the user to remain anonymous, invisible to all potential fraudsters, robbers, spies and other users with reduced social responsibility. With it, you can create your sites without advertising their location, and you can also contact with those sites that are blocked by the official censorship.

Mike Perry, one of the developers of Tor, believes that the browser can provide a high level of protection even from such spywarelike prism.

History of appearance

Tor Browser was mainly created in the Research Laboratory of America's Navy, when American special services worked on the Free Heaven project, or free heavens. For an unknown reason, the project was closed, and all source codes They fell into a public network, where they were caught by talented programmers and organized the Torproject.org community. Here the browser has already been finalized by voluntary developers, although continues to be improved, develop and updated to this day.

Just a year ago, Torah had more than 7,000 system nodes installed on all continents of the Earth, excluding Antarctica, and the number of network users exceeded 2 million on Tor Metrics statistics, in 2014 Russia joined the three countries using the browser torus most actively. Since the browser is an open source system, over which various programmers worked over for more than 15 years, it is possible not to worry about what it can be with a trigger, and instead of the protection of information itself will steal it.

Exactly open code The browser gives us a guarantee of its use.

Video browser review, a bit of history and the main purpose

How the system works

The existing TOR technology allows any user to go to any sites without leaving any traces after themselves. That is, on the site where you looked, you will not be able to track the IP address of your computer, and therefore will not be able to calculate you. It will not even be available to your Internet provider. And the browser itself information on your movements on the Internet will not store.

The principle of the bulk system can be represented in this way:

1. Communication nodes installed in different countries Apologists of this technology. 3 arbitrary nodes are used to transfer data, while no one knows which one. The data that users transmit is repeatedly encrypted, with each encryption level is another layer of a bulbous router package. It should be borne in mind that only the path is encrypted, or routing, and not the contents of the information packets. So if you want to secret information It reached the addressee in complete safety, additional encryption will be required.

2. On each subsequent node through which the information packet is passed, one cipher layer is decrypted containing information about the next intermediate paragraph. After reading this information, the used layer of the bulb is removed.

That is, the browser transmits the first node package in which there is an encrypted address of the second node. Node No. 1 knows the key for cipher and, having received the address of Node No. 2, sends there a package, which is similar to the fact that Luka was removed the first layer of husk. Node No. 2, having received a package, owns the key to decrypt the address of the node number 3 - removed another layer of husks from the bulbs. And so repeats several times. Thus, from the side it will be impossible to understand which site you eventually opened in the window of your browser Tor.

Video Installation and Setup Instructions

Disadvantages of the system

Search engines, an Internet provider or someone else who is already used to watching your surfing on the network, may guide that you are using Thor. They do not know what you are watching or doing online, but the very fact that you want to hide something will be known for them. Therefore, you will have to study existing ways of enhancing anonymity, if you choose this path.

In the system of the Thor Used simple computers, not high-speed. Another disadvantage flows out of this: information transfer rates in this anonymous network may not be enough to view, for example, video or other entertainment content.

Currently, the browser is working and actively developing, using more than 15 languages, including Russian. The latest version of the torus was released on January 23, 2017. In some countries, the Tor project site is blocked or subjected to censorship, which makes it impossible to load the Tor browser directly. In this case, you can use the mirror: Tor Browser Bundle on GitHub, but if the mirrors are not available, you can try to download it through the Gettor service.

Do not forget to leave your browser reviews

If you think that in order to walk on the network anonymously you just need to download Tor and run it, you are very mistaken. Today I will show you how to configure Tor correctly to ensure maximum anonymity. Also within this article I will give practical recommendations How to use the torus correctly. How to behave correctly in the deep web, what can be done, but what is impossible.

You may be interested in the article "", in which we talked about that in addition to all the well-known Web network still there are networks and article "", in which we made an overview of the best search engines in the deep web.

I remind you that using the site search form you can find a lot of information on the topic of anonymity in the network and about TOR in particular.

  • Where and how to download tor
  • How to install tor
  • How to configure Tor
  • Setting up Noscript extension
  • Setting the hidden browser parameters
  • How to work in tor

We are for freedom of speech, but against criminals and terrorists. I really hope that this article will be useful exclusively for the first category of people. In any case, we are not responsible for any illegal use of the TOR program.

How to download tor

It seems that it can be difficult, download and everything, but not so simple. You need to download only from the official site of developers. Not old versions with software portals and torrent trackers, but only last version At the official.

Why is it desirable to always set the latest version and update the installed timely? Because old version It may have a zero day vulnerabilities that can be used by experts to calculate your real IP addresses and even infect your system with malicious programs.

You can download Tor a Russian version for a direct link. By default, the English version is downloaded. If you need a Russian version of the Thor, then in the drop-down menu under the "Download tor" button "Russian". You can also download the Tor version for: Apple OS X, Linux and smartphones.

How to install tor

After the program downloaded, proceed to its installation. Double mouse clicks start the downloaded file. This window will appear:

Setting Tor

Select the location in which you want to install TOR. If nothing is not changed, the default Tor will set itself in the folder in which is installation file.


Setting Tor

Press "ready."


Click on the "Connect" button


We will wait for the browser download.


How to configure Tor

Now let's start configuring Tor. First of all, we correctly configure the extension noscript.

After reading your comments on the article, I realized that you did not quite understand me. My friends, these hardcore settings are more applicable to Darcnet, to ensure maximum anonymity and confrontation of deunionimization by power structures and hackers. If you want using torus or simply change the IP address, then you do not need these settings! You can use the tor right out of the box.

Setting up Noscript extension

Tor developers equipped their software very important and useful plugin Noscript, which is installed by default, but alas by default is not configured.

To configure Noscript on the left side of the browser, click on the Add-on icon. In the menu that appears, select "Settings".


On the White List tab, remove a checkbox from the field "Global Script Resolution ..."


Click the "Built-in Objects" tab and check the required fields. All exactly as shown in the screenshot below.


Setting the hidden browser parameters

Now you will configure the browser itself, for this you need to go to the hidden settings. Read more hidden settings The privacy of the Firefox browser we wrote in the article "" and in the article "".

So, in the address bar we write "About: config" and click on entering. After that, a warning window will appear, in which we click on the blue button "I promise that ..." and go further.


Configuring browser

Here we need to find and change some critical settings. First, change the download and processing JavaScript. You can do this by changing the "javascript.enable" parameter.

In the search bar, which is under the address string, write "javascript.enable" and press the input. Now right-click on the "Switch" item, which will change this parameter from "TRUE" to "FALSE".


Disable JavaScript.

In the same way, we find the "Network.http.sendRefererHeader" parameter and change it from the value "2" to the value "0".


Disable HTTP Referer.

We find the parameter "Network.http.sendSecurexSiteReferrer" and change its value to "FALSE".


Disconnection SecureXsitereferreR.

We find the parameter "extensions.torbutton.saved.sendsecurexsitereferrer" and change its value to "false".


Disconnection SecureXsitereferreR.

We find the parameter "Network.Cookie.CookieBehavior" and change its value from "1" to "2".


After these changes, some sites may incorrectly work in this browser. But you can always return the former settings that I certainly do not advise you very much.

How to use Tor

After you have made all the settings, I want to tell how to use Tor correctly. Here is a list of rules that need to be followed by everyone who uses Tor:

  • Do not install extra and unverified extensions into the browser.
  • Not under any pretext do not disable the supplement NOScript.
  • Frequently update the chain of nodes and overload the browser.
  • Do not open the Tor Browser (Mozzila Firefox) in full screen.
  • Do not work with Tor browser with admin rights.
  • Never go using your login and password to your main mail or in your real accounts of social networks in which there is any information about you or which are somehow connected with your real accounts. The exception of only the authorization form onion sites and forums. And of course, such sites are desirable to use a separate mailbox, which is also not connected with your real mail.
  • All downloaded in DeepWeb Files Check for viruses. On how to correctly check the downloaded files for viruses, we wrote in the article "". Run these files only on virtual system. On the choice of virtuals, we wrote in the article "" And how to install and configure virtual Machine To check the files for viruses in the article ".
  • To update the Tor browser in a timely manner.

I also advise you to use an anonymous operating system or other anonymous OS. Use the search, on the site we once obsess the best anonymous operating systems.

Anonymity TOR depends only on you and your behavior on the network, not one even the most anonymous browser will not protect your system and your information from the user's hand curves. Be vigilant, do not let yourself be misleading. If doubts arise, it is better not to press, do not move on the link and of course not to download.

Deep Web is not always a friendly environment. There you can turn away from people in costumes, if you do something not very illegal. And from hackers or just threw, if you are fluffy, naive dandelion user.

That's all, friends. I hope you could configure Tor correctly. Good luck and do not forget to subscribe to us on social networks. This is not the last article on the theme of the anonymity of TOR and information security.

Apparently, the Tor network remains Nevzloman. At least according to the internal NSA report of 2012, although this organization has the opportunity in certain cases to disclose the identity of certain NODs, as a whole, they are not able to disclose anyone on request. Yes, and these disclosures occurred on the focus of the type of error in the Firefox browser, which was included in Tor Bundle and others like. If you use TOR correctly, the probability of disclosure is extremely small.

2. TOR is used not only by criminals

Contrary to promotional opinion, TOR is used not only by criminals, pedophiles and other bad terrorists. This, to put it mildly, is far away. Activists of various kinds, journalists, just people who loving privacy make up a portrait of Tor users. Personally, I am very impressed by the position of the Tor developers, responsible for the question "And what do you have, what to hide?" The phrase: "No, it's not a secret - it's just not your business."
And the criminals have a big arsenal of funds, from a person's change to stolen devices or network access, from botnets to Trojan viruses. Using and promoting Tor you help the criminals no more than using the Internet.

3. Tor has no hidden loopholes and backdoors

It is rumored that Tor was created by the military, and they specially made themselves hidden loopholes. Although TOR was initially funded by the US Navy, since then its code is in open accessAnd many specialists in cryptography studied his sources. Everyone can explore them. And now the project is working on enthusiasts, privacy and anonymity in the Internet.
It also provides information that the US intelligence services hold about 60% of all NODs - but it is most likely distorted information that about 60% of financing allocate the United States in grants.

4. There were no cases of condemnation of anyone for the support of the relay-node

True, in Europe, in this Sightstone of human rights and legitimate paradise, or rather - in Austria, literally the other day of a person who kept the day off, accused of complicity, because Through this node passed the traffic of illegal content. So the risk of the content of the output node is obvious. Well, the relay-nodes should be out of danger, since they do not know according to the network scheme, where the request came from where he sent, nor any traffic. And to prove the traffic pass through Relay is almost impossible.

5. Tor is easy to use.

Many think that Tor is something complicated for hackers and computer geniuses. In fact, the developers have already simplified its use as possible - just download Tor Browser, and when you start it you will automatically use the TOR network. No settings, teams in command line and other things.

6. Tor is not as slow as you think

A couple of years ago, the network was slow. Now access to sites occurs with quite acceptable speed. Yes, torrents download via Tor cannot - and slowly, and harmful to the network. But you can conduct any other familiar activity without irritation.

7. Tor is not a panacea

Using Tor, still need to follow several rules and sort out a little about how it works, that he can and what he cannot, so as not to reduce the "no" all his efforts. If you are using the Tor Browser and, at the same time, log in to Facebook, meaning in this a bit. Understand how it works and use it competently.

Personally, I am a supporter of preserving privacy and anonymity on the Internet. Promotion and urge everyone to support the Tor project as the necessary and useful, especially in the light of sad events with new laws "against the Internet". Support Tor network. Install the relay - if you can select at least 50 KB / s in your channel for TOR, this will already be enough.

Why am I speaking for the privacy and the possibility of anonymity. After all, I am a law-abiding citizen and I have nothing to hide, right?
Well, for this personally I can answer the following arguments:

  • i can have nothing to hide, but what I do is not your business
  • times change, people change, and the laws change. I wrote something in the comments, and a couple of years after the adoption of the next chic law, it suddenly became possible to count to extremist statements
  • i do not believe that all people who are trying to follow my actions are crystal honest and loyal servants of the benemis. That no one will try to use the information obtained in their dirty selfish purposes.

It will be interesting to know your opinion on privacy and anonymity,% UserName%

As a rule, some Internet users are trying to ensure their privacy, so they regularly consider the basic ways to anonymize traffic from the Internet, which are available to use the usual yowser. In principle, everyday using VPN. can help in solving this problem, but this method It seems comfortable not everyone. Therefore, this article will talk about TOR - an anonymous distributed network.

So, what is the network "tor"

Nowadays, in RuNet, with the advent of state control and tightening position towards ordinary users, it is about the future fate of TOR and similar anonymizers. For a long time they are trying to ban the network "Tor", the reviews about which are extremely positive. In mass media, information about "Ban Tor" appears at the proposal of Russian security officials. Thus, the newspaper Izvestia contains a direct indication that today there is a supply of security forces on the ban on programs that hide on the user's network.

The Public Council under the FSB of the Russian Federation considers the necessary legal regulation of the activities of legal entities and individuals on the Internet. Therefore, he formed proposals on the need to ban anonymizers - programs that mask the data and the IP address.

If the court decision is closed to the access to a specific site, users using anonymizer will still be able to go to the site (for example, using the search on the TOR network). For example, users from China and Belarus are visiting sites without any problems that are blocked by local authorities.

The proposal of the security officials implies a ban on or browsers in which anonymizers are built into (Internet network "Tor", for example). In addition, web servers are also attributed to masking tools. These are autonomous sites with which users can move with another IP address on also there is an indication that such amendments will contribute to the federal law.

To date, the position of the state on this account is not yet fully determined.

Why do you need this network?

Why will you need a "torus" network for the usual and ordinary user?
In logic, every citizen who does not violate the law should think: "Why should I hide yourself on the Internet with an anonymizer? I do not plan unlawful actions - site hacks, distribution malicious programs, hacking passwords, etc.? " In the general sense, this question can be answered like this: some sites containing content for free downloadBlocked very quickly and become the inaccessible to most users. In addition, some employers restrict access to social networks and entertainment sites, and the "torus" resources are easy to access these prohibitions.

At the same time, the original opinion of one developer of free software Tor, which he voiced in an interview.

Opinion of a specialist

Why is anonymity required for ordinary Internet users who have nothing to hide?

The thing is that there is nothing to "hide" - this is not a reason for the complete control of all the actions of the user on the Internet by state structures. These structures work the most ordinary citizens who are guided in the work illiterately written by other incompetent citizens with laws. If such people do something do not like to spend money, time and health will have to spend money, time and health to proof their innocence with an unpredictable result. Why do you need a similar risk if there is a simple technical remedySupported by other, smarter people.

Among other things, together with anonymity, the user receives protection from censorship on the network at the state level. Is it worth thinking to an ordinary citizen, what site can be reached on the prohibition on the initiative of the Ivanov deputy? This is not the case of this deputy, especially if he is never informed, for which the sites today a citizen walked on his own.

Network "Tor": how to use

Tor is a network consisting of virtual tunnels, which will allow the user to best protect privacy and

The TOR operation principle: the program connects the user's computer with the network is not directly, but by means of a chain of several, randomly selected computers (repeaters), which also belong to the TOR network.

All data sent to the Internet using TOR becomes anonymous (source is hidden) and remain in encrypted form on the entire length between the user's computer and the last repeater. After the data is sent from the last repeater and are sent to the destination destination, this data is already in an open, usual form.

When transmitting important data, such as a username or password to enter the site, you need to make sure that the HTTPS protocol work.

It is worth noting that we owe the emergence of this anonymous network precisely by the American special services. Once upon a time there was a spy project, subsequently becoming scandalous. He got the name "Open Heavens" and for an inexplicable reason was minimized in a short period of time. After that, all data closed networkIn particular, the source codes were outdoor. Based on the information received, the initiative group of whose members were specialists in the field of the Internet and began to create their own free own networknot controlled from the outside. This private network was named The Onion Router, which means in translation into Russian "bulb router". That is why the "Thor" network symbol has an image of the bulb on the logo. This name explains the principle of an anonymizer - a chain of nodes and compounds leading to complete privacy can be associated with layers of bulbs. The network works in such a way that the end items cannot be installed.

Download and install Tor

Various TOR-package programs are available for download from the official website of the project. Speaking about the "Thor" network, how to use it, it should be noted that there is software package Tor browser. It does not require installation and contains a browser. Most often that Mozilla Firefox.. Browser is configured in advance for safe output Using Tor to the Internet. You just need to download the package, unpack the archive and run the TOR program.

Using Tor Brouser Bundle

After downloading the Tor Brouser Bundle software assembly, you need to save the package to the "Desktop" or USB. Usually, this option is convenient for compact solutions when the TOR load is required from the flash drive.

Speaking about how to get into the "Thor" network, it should be noted that the user must have a directory in the presence containing several files. One of them is a Start Tor Browser file or "Run browser Tor". It depends on which operating system is used.

After starting the Tor Brouser Bundle program, the user will first see the launch of Vidalia and connect to the TOR network. After that, the browser will be launched, which will confirm the use of Tor at the moment. Tor network is ready for use.

Important moment: It is necessary that the browser that was in a TOR package is used, and not the own user browser.

In Tor Browser (Mozilla and Torbutton plugin), settings have already been configured for a full JavaScript ban, settings for HTTPS and other parameters for a secure Internet connection.

For a regular user, this software package is the best option for working with TOR.

There is a stationary option for TOR installation. This is a connection to the "torus" network using the Vidalia Polipo Tor assembly.

Here is an example of installation for Windows 7

You need to download the program from the Tor project site and make it install on your computer.

Secure on the Internet is carried out only with the Mozilla browser with the Torbutton plugin. If this plugin is incompatible with the version browser Mozilla.You need to use universal FoxyProxy Basic.

Today, TOR developers can offer to download Bundle packages (Vidalia Bundle or Vidalia Relay Bundle). They are already immediately with the settings "Bridges" or "relay".

The need for such additional settings Can arise from users whose providers block the TOR network. These are bridge settings that can help if the default "tor" does not connect to the network.

Proper tor setup

If the user himself wants to become a member of the TOR project, then you should familiarize yourself with the RELAY settings.

If the provider or sysadmin blocks access to the TOR site, then the program itself can be requested to email. At the same time, the request is done with mailbox Gmail, you do not need to use email located on Russian free domains.

To get an English Tor browser package for Windows, you need to send a letter to the address [Email Protected] . In the message itself you only need to write a word Windows. The field "Theme" can be empty.

A similar method is possible to query the Tor browser for Mac OS. To do this, write "MacOS-i386". If you have Linux, then you need to write "Linux-i386" in the case of a 32-bit system or "Linux-x86 64" for a 64-bit system. If a translated version of the TOR program is required, then write you need "Help". In the response letter An instruction and list of available languages \u200b\u200bwill come.

If the TOR is already installed, but does not work, it could happen for the following reasons.

With a normal connection, if not connecting to the "Thor" network, you can try the following: Open the "VIDALA control panel", click on the "log of messages" and select the "Advanced Settings" tab. Tor Connection Problems may be for such reasons:

1. System clock are disabled. You need to make sure B. proper installation Dates and time on the computer and restart TOR. Perhaps you will need to synchronize the time of the system clock with the server.

2. The user is behind the firewall. To TOR used and 443, you need to open the "VIDALA control panel", click "Settings and Networks" and set a check mark near the inscription "My Firewall allows me to connect only to certain ports." This will help customize the "Thor" network and give it to work fully.

3. Lock Tor from the side antivirus base. You need to make sure that the antivirus program does not prevent TOR connect to the network.

4. If the computer is still not connected to the "torus" network, it is very possible that an anonymizer is blocked by ISP provider. It is often possible to get around the TOR bridges, which are hidden relays and which are difficult to lock.

If the exact reason for the impossibility of connecting TOR is required, then the email to the email address should be sent to the developers [Email Protected] And attach information from log log.

What is the bridge and how to find it

To use the bridge, it is necessary first to detect it. This is possible on bridges.torproject.org. You can also send a letter to [Email Protected] After sending the letter, you should make sure that "Get Bridgees" written in the letter. Without this will not come a response letter. It is also important that sending should be with gmail.com or yahoo.com.

After setting up several bridges, the "torus" network will become more stable if some bridges have become inaccessible. There is no confidence that the bridge used today will also work. For this reason required permanent update List of bridges.

As a bridge is used

If you have the ability to use multiple bridges, you should open the "VIDALA control panel", click "Settings", and then "Networks" and install a check mark near the inscription "My provider blocks the connection to TOR network." Next, enter the list of bridges in the field. Then click "OK" and restart TOR.

Using Open Proxy.

If the use of the bridge has not led to anything, you need to try the TOR setting when using HTTPS or SOCKS proxy to gain access to the TOR network. This means that if even Tor is blocked in local network The user, that is, the ability to safely use the open proxy server to connect.

For further work, the Tor / Vidalia configuration and the list of HTTPS, SOCKS4, or SOCKS5 proxy.

You need to open the "VIDALA control panel" and click "Settings".
Next click on the "Network" tab, choose "I use Proxy to access the Internet".

In the "Address" field, enter the Open Proxy address. This is an IP address or proxy name, then enter the proxy port.

It is usually not required to introduce a username and password. If this is still needed, they should be entered into the appropriate fields. Select "Type for Proxy" as HTTP / HTTPS or SOCKS4, or SOCKS 5. Press "OK". Vidalia and Tor now have to configure the use of proxy to access the rest of the network.

On Tor website today it is possible to find many more other different products for others. operating systems (Mac OS, Linux, Windows). Thus, the search engine in the network "torus" can be used regardless of which device you use to visit the Internet. Differences can only be in separate tinctures relating to the features of the installed OS.

There is an already implemented solution for tor usage for mobile phones, For example, for Android. This option There was already testing and, as it turned out, it is quite efficient, which cannot but rejoice. Especially with the fact that most of the users moved due to computers to convenient light plates.

Tor system for use in smartphones

As mentioned above, there is a possibility tor settings On the device with the Android platform. To do this, the package called Orbot is installed. The description on its download is on the site TOR.

There are also experimental packages for Nokia and Apple iOS.. At the same time, after a number of tests and improvements, the output of an excellent tool that makes it possible to achieve uniqueness on the network, guaranteed.

In addition, TOR developers launched several more anonymizers, such as Tails. This is an OS based on Linux, providing anonymous and secure network surfing. On the site "Tor" there are still a number of products that will be the tintering user.

Also TOR makes it possible to use hidden services for users. You can, without opening your IP address, provide
It is clear that such a service does not find a lot of demand from users, although this information is located on the TOR website simultaneously with the instructions, how to search in Tor-South.

These were the basic information relating to this most famous and well-working anonymizer. To date, there is hope that users will be able to launch the TOR network on their computer and further use the safe and anonymous Internet at their discretion.

The Browser appeared on the light recently. His creator is the company that produced Mozilla Firefox.

What you need to know before starting work

See also: Top 25 best proxy servers for anonymous surfing on the network

First of all, you need to go to the browser site.

If you are in the place where the access is closed to this site, you must send an email to email: [Email Protected].

IN The letter itself should specify the version of the program:

You should not worry if you saw the inscription HTTPS when downloading the site. These characters mean that the connection is protected.

Main page

The first thing to do is click the Download Tor Browser button.

This action will allow you to go to the table on the same page where links are collected by different versions Tor Browser.

2 Here you need to choose a language that will be present in the program and the system to which the browser will be installed.

After that you need to click on the link you selected and select the location of the file.

It can be any folder on the hard disk of a personal computer or on a flash drive.

No, you will not need to install this applicationlike most programs.

The previously downloaded file is required to simply unpack the folder you selected and run only from there.

To install the program, follow all of the following steps:

1 You must go to that folder to which the torus file was previously loaded.

File download folder

2 Right-click on the file and click on the Open tab.

File opening

3 You need to select the language you want to install in the program.

Setting language

4 You must select the folder to which you want to install a browser torus (in our example, the application will be installed on the "desktop").

Place Installation

5 When you select where to install Tor Browser, click the Install button. During installation, such a window should appear:

Installation

It is required to click the left mouse button on the "Finish" tab to complete the installation.

Finishing installation

Congratulations! You have completed the installation of the torus. It remains for small. You need to configure the program and learn to use it.

Setting up network connection

See also: How to disappear from the Internet? All ways to remove accounts

You should know that when you first start the program, the program will ask you the question how, you need to connect to the Internet.

There are two options

  • The first is to connect directly. This option must be selected if your Internet access is not limited, the application torus is not blocked or not prohibited at the legislative level.
  • The second option is limited access . Such a connection will be suitable if your Internet access is limited, the Annex that is blocked or prohibited at the legislative level.

This question is set to the user only when the program is first started. The application is no longer required in the settings. It is worth knowing that absolutely at any time this choice can be changed in the opposite direction.

Such a change is suitable for those people who often change their geolocation or in the event that the situation in the country living in this plan has changed dramatically.

How to change the settings is described slightly below.

Connect to the network directly

See also: Top 15 best free antiviruses for Windows | Rating 2019

  • After the installation program is completed, you have on personal Computer Window automatically opens:

Configuring browser

  • To connect the browser, you need to click "join".

  • Congratulations! Thor is open.

If you need to use a browser in this location, where this system Blocked, in this case you will need a repeater-bridge. It is worth noting that in the public list they do not exist, so it is much more difficult to block the blocking.

Some of these can also contribute to the transport connected previously. They, in turn, are trying to hide traffic from the network and back.

This fact suggests that the system opposes the filters that is online. They are trying to block bridges. By default, this transport is called oBFS4.. It is able to reduce the chances of other users to find out if you are connected to the network torus or not.

It must be understood that the browser does not have a direct purpose to hide the fact of using the application.

It is possible to familiarize yourself with this system in more detail, directly on the site itself.

Browser settings

  • If you understand that network access is limited, you need to click "Set up".

Settings gateways

  • You need to choose "Yes" and click the "Next" button.
  • It is required to choose "Connect to predefined bridges".
  • The next step that needs to be done is to click the Next button to configure the proxy.

Here the program will ask you a question whether a local proxy is needed to enter the network. Now we will assume that we do not need it. If the situation develops on the contrary, you need to look at the settings for your standard browser and copy proxy parameters.

Also, the same settings can be found in the network access settings. And the last option, you can ask for help from the browser support system.

  • Select "No" and click "Connect" to start the browser.

  • Congratulations! Setup completed. Literally a few seconds, the browser itself starts.