Step-by-step instructions for using the Tor browser. Creating a New Identity


Especially for those who want not to depend on their state, their provider, their admin, etc. And also for those who do not want to be “recognized by IP”.

Today I’ll tell you about the “TOR project”. In the first part I will tell you how and where to download the program. In the second part I will tell you how to install it. In the third - how to launch and use. Fourth - how to configure Opera browser for working with TOR.

But first, I’ll tell you in simple words what “TOR” is. TOR is an acronym for "The Onion Router". What it is?

Here's what the wiki says:

With TOR, users can remain anonymous when visiting websites, posting content, sending messages, and using other applications. TOR technology also provides protection against traffic analysis mechanisms that compromise not only user anonymity, but also the confidentiality of business data. business contacts and etc.
That is, no one except you will know who you are, where you are from, and where you went on the Internet. These are the advantages. Minuses? There are also disadvantages, but more on them later.

What problems can TOR solve?
1. Visiting sites blocked by your state, ISP or system administrator. For example, using TOR you can easily access Odnoklassniki or VKontakte, no matter how your management and administrators block them.
2. TOR can even work through a proxy (!!!).
3. Through TOR you can send traffic to your IM (instant messenger), such as ICQ, Mailru agent, jabber, etc., even if they are blocked at work.
4. TOR does not require installation. Therefore, you don’t have to be afraid of the ban on installing programs set by the system administrator.

Thus, TOR is a real panacea for all prohibitions on the one hand and violation of anonymity on the other. If you decide that you need it, it's time to download it, install it and start using it.

There you need to find this picture and click on the one circled in red:

On the page that opens, pay attention to what is circled in blue:

You need to select "Russian":

Now you can click on the orange button labeled “Download” and download TOR to Russian language. The installer is currently approximately 22 MB in size.

Part 2. Install TOR Browser
I'll start with a strange phrase: " TOR browser does not require installation." Yes, yes! The file that you downloaded is actually a self-extracting archive. When launched, it will ask where to unpack:


Click on the "" button, select the directory to unpack. Attention! I repeat for the 3rd time: TOR browser does not require installation, and you can even run it from a flash drive! Therefore, you can even unzip it onto a flash drive. After selecting the directory, click on the "".

The program will unpack for some time:

After unpacking, the "Tor Browser" directory will appear in the directory you selected:

Inside it there is a file called "Start Tor Browser":

Actually that's all. You can launch TOR browser.

Part 3. Launching Tor
Everything is simple here! Remember the "Start Tor Browser" file from part #2? Launch it!

For some time the program will perform some shamanic actions:

Let me warn you right away, the first launch takes a very long time. But then after waiting you will see this:


Notice the blue frame. This green onion indicates that Tor is up and running. From the settings, I recommend paying attention to the “Show this window at startup” checkbox (red frame). I recommend unchecking this box. It's always after the start anyway Tor works the browser will launch" Mozilla Firefox" (a portable version of which comes with the program).

In addition, the Tor icon is placed in the tray and can take one of the following forms:

  • - Tor starts;
  • - Tor works;
  • - Tor has been stopped.

  • After launch Tor The browser will show something like this:

    Actually, if you see such a window, you can start to rejoice and use Tor for your needs.

    But there is one problem: this can only be done in Mozilla browser Firefox. Moreover, this browser must be running. After all, as soon as you close your browser, Tor will also close. Therefore, I installed the “Minimize to tray” add-on in this browser (let it lie there). And I configured one of my Opera to work with it. And now I’ll teach you how to do it.

    Part 4. Setting up Opera to work with TOR
    You can determine whether your browser works through TOR or not by clicking on this magic link: https://check.torproject.org/?lang=en .

    This is what the Opera browser showed me:

    It doesn’t work... But, as they say in the army, if you don’t want to, we’ll teach you, if you can’t, we’ll force you.

    Go to Opera settings:

    To do this, click on the "Opera" button in the top left of the browser (blue frame), select "Settings" (red frame) in the drop-down menu, and then select " General settings" (green frame). Or simply press "Ctrl + F12".

    You will get to Opera settings:


    Here you need to select the last tab on the right, “Advanced”.

    Now you need to select the "Network" tab:

    There click on the "" button:

    Now you need to fill out everything as shown in the screenshot below:

    After that, click on the "OK" button.

    Now we check the browser using the magic link. Everything is fine!

    Now I will answer the questions you ask me.
    1. Can I use other browsers (for example, Google Chrome) for Tor?
    Description

    The article is provided solely for the purpose of familiarizing yourself with the technology of the Tor browser.

    IN last years You can hear about restrictions on the Internet more and more often. Governments different countries prohibit their citizens from accessing resources containing content that, in the opinion of deputies, is incorrect. Operators are forced to transmit information about users, and there is no talk of any anonymity on the Internet. At the same time, it is not always the case that sites blocked by decision of certain authorities actually contain materials that can harm users.

    “The forbidden fruit is sweet,” and various restrictions on the Internet have given rise not only to ways to circumvent them, but also to a whole secret network, which can only be accessed by using special means, hiding information about the user. The anonymous network is called Tor, and it is available absolutely free to everyone.

    What is Tor

    The abbreviation Tor stands for The Onion Router. This name may seem ridiculous to people who are not familiar with the concept of onion routing. It refers to the technology of anonymous exchange of information using standard computer network. The operating principle of the system is based on permanent encryption of data during transmission from server to client. Data passes through many network nodes, thereby erasing traces that could lead to the sender and recipient of the information.

    Thanks to Tor, users do not have to worry about their anonymity on the Internet. They get the opportunity to view any information they are interested in, secretly leave messages on websites, and send encrypted messages to each other. private messages and do much more secretly from everyone. Using Tor, you can easily bypass all ISP restrictions imposed on sites.

    As you can understand, sites are hidden Tor networks are not moderated or checked by anyone. You cannot send a content complaint to them, and if you do, such actions will lead to nothing. Accordingly, in Tor you can find, among other things, information prohibited in all countries. Shocking, illegal, devoid of humanity and meaning, materials and services are contained on the Tor network. This is why it got the name “dark internet”. Sites created exclusively for access via Tor are located in the .onion domain zone. They are not indexed by regular search engines, and can only be accessed through the anonymous Tor network.

    You can view information on the Tor network through any computer, but this requires a browser of the same name, which is distributed free of charge.

    How to use the Tor browser

    Starting to use Tor is quite simple; to do this, you need to download Tor Browser from a regular browser and install it. Tor is installed as follows:

    Once the Tor browser is installed on your computer, it must be properly configured to work on the anonymous network. Launch Tor via the Start Tor Browser.exe shortcut from the folder where it was installed. Next, you need to set the primary parameters. This can be done automatically by clicking “Connect” in the window that opens, but this method does not always work.

    If you are unable to automatically connect to the Tor network, you can select “Configure” and set the necessary parameters yourself. Process manual settings The Torah is also quite simple, you will need to answer 2 questions:


    When the answers have been selected, the Tor browser will try again to produce automatic setup according to the data received. This may take a couple of minutes, after which Tor will start.

    Please note: The Tor browser is based on Firefox.

    To finally make sure that the computer is now on an anonymous network, you need to click on the “Check Tor Internet settings” button.

    If a page opens that says that the browser uses Tor, then everything is configured correctly and the program can be used for anonymous access to resources.

    Important: In the Tor browser, you can view the chain through which user anonymity is achieved. On any page, click on the green onion icon to the left of address bar. A pop-up menu will open, where you can see through which chain the request passes from the computer to the final server.

    To achieve maximum privacy, Tor provides 4 levels of security. By default, the browser sets it to minimal, but you can change it if you wish. this parameter. To do this, click on the green onion to the left of the browser line and select “Privacy and Security Settings.”

    A new window will open where you can use the slider to adjust the security level from low to high. Next to each of the options it is written how they differ and what functions they turn off. The more high level security, the worse various plugins and services will work in the browser, and the content on sites will be displayed.

    For basic use Tor browser is enough low level security.

    What are the disadvantages of the Tor browser?

    Complete anonymity on the Internet is quite a significant advantage for many to completely switch to the Tor browser. Despite this, the number of people who use it on permanent basis, few.

    Roskomnadzor is angry and blocks access to sites in batches. Even porn was banned, although previously the entire Internet was based on this. You used to connect through your dial-up modem, and there was only Varez, porn and a couple of good authors to read. And pay per minute for all this. Eh, nostalgia. Well, screw him with this porn and Varez, there’s no need for it anymore. By at least to me. But requests from clients and friends who cannot go to some “necessary” site and download an “important document” are beginning to arrive more and more often. They have read about Tor and other anonymizers and want access to the forbidden site.

    It’s not difficult to set up, but for some reason everyone starts to get scared by the buzzwords when they first load it. Let's try to figure it out and write small instructions. Let's install Tor and launch it.

    1. Download and install Tor. I believe in you, you can do it.

    2. Launch "Start Tor Browser". There are two options for the development of events:

    Connect. This option is more suitable if your Internet connection is not monitored or additionally monitored. For example, you just need to access a blocked site. In most cases, this connection is sufficient.

    Tune. If you have reason to believe (or know for sure) that someone is monitoring your Internet connection or, for example, Tor is banned in your country, which may well happen soon, then select this item. I selected "customize" to see what it offered.

    3. If censors have already reached your Internet and are monitoring whether you are using methods and programs like Tor to bypass their filters or protect your anonymity on the Internet, then you need to indicate the address of an intermediary site (relay or, as it is more often called called a bridge). By clicking the Help button, you can get an easy-to-understand explanation of what a bridge is and where to find the bridge addresses to set up Tor on your computer. If you do not have such problems yet, then select “No” and “Next”.

    4. Sometimes your Internet is configured in such a way that there is some kind of “intermediary” between you and the Internet resources you want to access. This is called a proxy (proxy server). Check your browser settings to see if you are using a proxy.

    5. Done. Previously, Tor was much more difficult to configure. You can check whether the browser is working correctly by following the link: https://check.torproject.org/?lang=ru. This will be correct:

    But no:

    Or check on flibusta.net. This is how a regular browser in Russia shows it:

    And so it is in Tor.

    Check the pornhubs yourself. =)

    7. If Tor Browser is running, you can access the settings by clicking on the onion icon - it's called Torbutton. Here you can change your identity, that is, change your IP address, as well as change your network settings if you messed up something in the previous paragraphs.

    8. Now that’s all for sure. I hope this was helpful.

    In today's article we will talk about Internet security. Tor is one of the tools to protect against eavesdropping of your data and create a secure connection to the Internet.

    I will tell you what a browser is, show you where to download it, how to install, run and configure the Tor browser on your computer.

    What is TOR

    Tor is free and open software onion routing. The architecture of proxy servers that install anonymous network connections, protected from surveillance. In simple words, anonymous network virtual tunnels that transmit information in encrypted form.

    The browser was developed by federal order at the US Naval Research Laboratory, in the Center for High Performance Computing Systems.

    Where can I download

    It is advisable to download Tor on its official website. But it is not always available, this is due to the fact that your Internet provider may block this site. If official resource is not available, you can download the browser yourself on the Internet or from my Yandex disk.

    Installation

    After downloading, a file with a cross-section of the onion appears, run it.

    Select the desired language.

    Select the installation folder where the program files will be unpacked. Can be extracted to your desktop.

    Unpacking takes a few seconds.

    The installation is complete, you can leave the Launch browser now checkboxes, add a shortcut to the start menu and to the desktop.

    A folder with the program and a shortcut to launch it appear on the desktop if you leave a checkmark.

    Launch setup

    Launch the shortcut with Start program Tor Browser. Are opening network settings Torah. Before connecting to the Internet, you need to specify the type of your connection.

    Personally, for me, the first launch of the program took a very long time, but I did not connect to the network and the browser did not start. If your process stops at Creating an encrypted directory connection, you can wait 5-10 minutes. If the browser still does not start, then most likely your Internet provider is blocking open ports input of the Torah network. I recommend going online with antivirus enabled to ensure maximum protection, for example.

    Click Cancel, select the second option Configure. Your computer's Internet connection is monitored or enabled by a proxy server.

    Setting up browser gateways. Is your ISP blocking your internet connection? We indicate Yes and click next.

    Selecting and configuring bridges. Connect to predefined bridges, transport type: obfs4 (recommended). Each type of bridge works on in various ways connections, if one doesn't work, try others.

    You can go to Help and read the information offered about help with bridge repeaters.

    Local proxy server settings. If you are at home, you do not need to configure a proxy server. If you access the Internet through a company, university or school network, then it may be required. So I go online from home, then I’ll select No and click connect.

    If upon connection appears Exclamation point in a triangle, it means something went wrong, you need to cancel the connection and connect again, checked more than once.

    I warn you right away, it may not work the first time, so be patient. Perhaps in Kazakhstan they are blocking the Tora ports, but in Russia everything is fine.

    I was able to enter when choosing bridge transport - fte. Perhaps it will work for you when choosing other types of transport bridges - experiment. As soon as you see the relay information loading, there is a high probability of launching the TOR browser.

    Browser settings

    This is what it looks like running browser Thor.

    It is not recommended to open the browser to the maximum size; this can track the size of your monitor and track you. The developers recommend using the browser in its original size. A notification about this will appear at the top, near the address bar.

    We go to any website and look at the location, for example yandex.ru.

    To change the location and IP address, click on the onion and select New Identity.

    The browser restarts, go to any site and look at the location again.

    They immediately try to extract our HTML5 canvas image data, I advise you to select Never for this and other sites.

    When you visit any website, it changes its IP address and other security settings.

    If you are used to saving passwords in your browser from email or other sites, then this habit needs to be reconsidered here. When you close your browser, all passwords, cookies, and data you entered will be deleted. This is necessary to ensure the security of your information.

    I suggest you look step by step video instructions for setting up your browser.

    Tor browser settings | website

    Results

    Today we got acquainted with the TOR browser, found out where you can download it, how to install it, and discussed the Tor browser configuration topic in detail.

    You may have questions related to setting up the TOP browser. You can ask them below in the comments to this article, and also use the form with me.

    You can also ask any questions related to computer topics On the page .

    Thank you for reading me on

    Hello friends! Let's continue our acquaintance with the “onion” Internet. In order to get there, we need a browser Tor and start using it. But this is not enough if you really want to be a real conspirator. It is not enough to install Tor, because on your computer network connections install other programs, including the operating system itself.

    This thing needs to be turned off. Today we’ll talk about how to achieve greater privacy, we’ll tweak things a little in this direction. Windows system 10. On the official website of the Tor browser there is a memo that says that the user needs to change his habits if he wants to achieve privacy on the Internet, be sure to read it!

    How to properly configure the Tor browser for greater anonymity?

    If you are a real conspirator, you need to start with operating system. Does not exist full guarantee protection from surveillance, no system can give you a 100% result. But we ourselves can try to increase the effect by installing on the computer only what is necessary, nothing unnecessary. Ideally, you need a lower edition operating system - no higher than Windows7. Why?

    In Windows 10, a significant part of the services and programs work over the Internet, with Microsoft servers, it has programs that determine your location, and collects information about the user, in accordance with the Microsoft Privacy Policy. Agree that such a modern operating system is more difficult to make private than earlier ones, for example, Windows XP or 7. There is an opinion that in the “ten” it is impossible to completely disable the transfer of user data.

    If you are seriously afraid of surveillance, there should be nothing on your computer other than the operating system and browser. Tor. Working anonymously, you will have to give up the usual services like YouTube; it is not recommended to use torrent clients or Skype. Some sites use various scripts to establish an IP address,

    plugins. You will have to refuse to install them, and also learn how to configure and clean the browser from cookies. For ordinary Windows users 10, you can try making privacy and security settings regular means. It is recommended to do something like this:

    1. enjoy account With . It is recommended that you do not use a PIN as a password, but rather create a strong alphanumeric password. An outsider will not be able to log into the computer ( Settings-Accounts— Login options):

    2. If your account is linked to - disable the connection. To log into the computer, we use only a local account (Settings - Accounts - Your data):

    3. If you use a laptop, you can configure a random hardware address on Wi-Fi networks. In each Wi-Fi networks your computer will be assigned new address; this way it will be difficult to track you and this way (Settings - Network and Internet - Wi-Fi. — Use random hardware address). Not all models have this feature.

    4. If you are a full-blown conspirator, you can go there Wi-Fi settings disable automatic connection to network:


    5. Next, we check whether it is disabled voice assistant"Cortana." Cortana usually saves your voice and search history. Disabled by default. ( Settings - Privacy- Speech and handwriting text):

    6. In the "Confidentiality" section there are the remaining important settings. We consistently disable everything that seems suspicious to us (Settings - Privacy - General, and down the list to the very end). Let's start with Windows permissions:


      In the “Diagnostics and reviews” section we disable everything:


      In the “Action Log” we clear the log of our disabled Microsoft account, remove the data collection and synchronization flags with:


      Next in line are individual applications. First, disable the location service:


      Below is a list of applications that transmit coordinates, check if all are disabled:


      You can (when necessary) disable access to the laptop camera (and configure access individual applications to camera):


      We do the same with the microphone settings:


      The next step is to disable the transfer of Microsoft account information that is used when running Windows 10 applications:


      If you worked on several devices under your account Microsoft entry, your contacts, postal addresses, Skype, synchronized. Hiding contacts:


      If you use a calendar and reminders at work, you will have to disable them too. Based on your records (which are transmitted to the servers), you can be identified. First the calendar:


      We do the same with by email. To receive/send mail, use the Tor browser, not email clients.


      We also turn off reminders and the meeting scheduler:


      Windows 10 - mobile system, is built into smartphones and tablets, and can send and receive SMS. Disable:


      Data exchange function Bluetooth protocol disable:


      Be sure to disable applications in background, they connect to servers on a schedule and unmask your traffic:


      The most important thing was done. Let's also disable application diagnostics:


      And then, we go down the list to “ File system", let's look. Of course, we cannot guarantee that we just went and turned everything off. Who knows what else the developers came up with? Don't forget to delete from your computer third party programs, using network connections - type Adobe Reader, FlashPlayer, and all others that are registered in the “Task Scheduler” and are regularly updated according to schedule. Sometimes it’s easier to install Windows from scratch and use the “anonymous version” on separate device- for Tor.

    7. For a real conspirator, I recommend disabling receiving in Windows 10. Instead of Defender, you can use it to scan for viruses free utilities, and updates may disrupt the settings made. After large, cumulative updates, more functions are added, their appearance must be monitored and disabled in a timely manner.
    8. How to set up a proxy in the Tor browser?

      If you work in an organization that uses a proxy server to access the Internet, you must configure the settings of this server for the browser to work. All you need to know is to go to the network settings...


      And fill in the required data in the fields:

      If only certain ports on your computer are open to access the Internet and you know their numbers, you can register them in Tor settings:

      The most commonly used ports in local and corporate networks— 80 and 443. In the settings Tor they are already registered by default.

      Enabling and configuring Tor browser bridges

      If you arrive in a country where Tor officially prohibited - you can request a chain of “bridges” - this is what the system’s intermediary servers are called Tor, which will take you to the site you want. To do this, set the flag in “Settings”:

      By default, the program prompts you to select bridges from the list:

      Try choosing any of the bridges from the list. As a rule, this works. Enter the captcha. If it doesn’t work, try requesting a list of bridges from the torproject website:

      This is not always possible. Last method- this is to manually specify the bridge that your friend gave you.

      With any option, you will have a list of bridges, and you can change your identity. This way you will be even more anonymous:

      Setting up Tor browser on Android

      After installing the application on your smartphone, setting it up is very easy. Especially after you have figured out the settings on your computer 🙂 🙂 . Everything is focused on mobility and convenience. You can select the country (Russian IP)

      You can configure bridges in case of censorship:

      And to work with applications, you must enable VPN mode...

      ...and mark those applications on your smartphone that, in your opinion, can open up traffic. I haven't tested it personally mobile version. Conspirators will need to configure traffic for all applications that use the Internet so that they work through Tor on a smartphone.

      How to configure the Tor browser so that IPs are from a certain country?

      Let's launch a regular browser to check and see what address is displayed. Type “my IP” into Yandex

      I have a static dedicated address, so I hid it in the photo. Now, if we go to Tor and check the IP from there, it will be different:


      It turns out that I am sitting in Liberia and my provider is obviously fictitious. For example, I need to disguise myself as being from Russia. To do this first let's close Tor, and go to the folder where you have it installed. Then we will open the desired folder along the way:


      We need a torrc file, we need to add the lines there:

      1. ExitNodes (US)
      2. StrictExitNodes 1

      The file can be opened by anyone text editor"notepad" type. Copy there required lines, it should look like this:


      In the first line we indicated in curly braces the code of the desired country for the Thor output node. This code can be changed. The second line specifies country bans; we don’t touch it for now. Don't forget to save the changes. Afterwards, we check the address again on the same service:

      You can set the “range” of allowed countries by writing this: ExitNodes ( US ) ,( RU ). Please indicate the correct countries.

      How to ban a country in the Tor browser?

      To ban IP addresses of certain countries, edit the bottom line and leave the top brackets empty:


      We do everything carefully and save the changes. Restart the browser and use it!





    

    2024 gtavrl.ru.