Thor browser takes a long time to connect. Free anonymous Tor browser


Browser Tor(Further Tor Browser ) ensures the anonymity of your actions on the Internet. It hides your identity and protects your web connections from many types of online surveillance. Tor can also be used to bypass Internet blocks.

  • How to remain anonymous and bypass censorship on the Internet

What will you learn from this chapter?

  • How to Hide Your Digital Identity from the Websites You Visit
  • How to Hide Websites You Visit from ISPs and Spyware
  • How to bypass Internet censorship and filters
  • How to protect yourself from unsafe and potentially malicious websites with an add-on NoScript

1. Introducing Tor Browser

2.1 Downloading Tor Browser


Image 2. Tor Browser bridge settings

Step 2. Select Yes.


Image 3: Setting up bridges

Step 4. Select option Connect to predefined bridges.

Step 5. Click button [Further] to configure proxy.

Tor Browser will ask if you need it to access the Internet. local proxy. In this example we're assuming you don't need it. If need to, look at the settings of your usual browser and copy the proxy settings from there. (IN Firefox browser you can find it in the menu Settings > Advanced > Network > Configure. In other browsers, you may find the same settings in the Internet access settings. You can contact support system browser for help.


Image 4. Proxy settings

Step 6. Select option [No].

Step 7 Click button [Connect] to launch launch Tor Browser.


Image 5. Connecting to the Tor network

After a couple of moments, Tor Browser will open.

3.2.2. Connecting to the Tor network with other bridges

You can also connect to Tor networks, indicating bridges on one's own. This is rarely used (mostly they prefer predefined bridges), and therefore there is less chance that this method will be blocked. If you are unable to access the Tor Project website, you can ask for addresses of bridge sites by sending an email to [email protected] , provided that you are using an account Riseup, Gmail or Yahoo. Insert words get bridges in the body of the letter.

If you have There is to gain access to the Tor Project, you can find out the addresses of such bridges, Go to the page https://bridges.torproject.org/options and follow the steps.

Step 1. Click button Just give me the addresses of the bridges!.


Image 1: Obtaining Tor Bridge Addresses

Step 2. Type the characters from the picture ( captcha) and press Enter.


Image 2. Captcha

You will see three bridge addresses.


Image 3. Bridge addresses

Step 3. Now that you have the bridge addresses, you can dial them in Tor bridge settings as shown below.

Note. If this is your first time launching Tor Browser, you may see a screen Tor bridge settings, just following the steps from . If Tor Browser is already configured, refer to .


Image 4. Tor bridge settings

3.3. Changing Tor Network Access Settings

You can change Tor settings when the program is already configured. Let's say you're traveling to a country where Tor is blocked. How to change settings? Follow the steps:

Step 1: Click button to see the Tor Browser menu.


Image 1. Tor Browser settings menu

Step 2. Select Tor network settings to determine how Tor Browser connects to the Internet.


Image 2. Tor network settings

In the settings you can enable or disable bridges and select other options.

When you're done, click button And restart Tor Browser.

4. Anonymous access to the Internet via Tor Browser

It's important to remember that Tor Browser provides anonymity only for those actions that occur in the Tor Browser window. Tor itself does not protect all other online activities.

Note. In accordance with privacy policy , Tor Browser configured so as not to save browser history on HDD. Whenever you exit Tor Browser, your history is deleted.

4.1. How to check if Tor Browser is working

Tor Browser hides your IP address from the sites you visit. If the program is configured correctly, it should appear as if you are accessing a website on the Internet from an IP address that is different from your normal IP address, and your physical location cannot be calculated from the IP address.

The easiest way to make sure that the program works is to check on the developer’s website https://check.torproject.org/ .

If you don't use Tor, you will see:


Image 1: Check shows that Tor is not working properly

If you are using Tor, the image will look like this:


Image 2. Test shows that Tor is working as expected

Do you want to know the IP address under which you connect to the Internet via the network? Tor? There are many ways to do this on the Internet, including websites that support encryption. https(which will make life difficult non-providers who want to “fake” the result):

If you go to this site Not Through Tor Browser, you can see your real IP address associated with your real location. If you access via Tor Browser, a different IP address will be displayed.

4.2. Creating a New Identity

You can create a "new identity" in Tor Browser. In this case, Tor Browser will randomly select new set retranslators. From the outside it will look like you are logging in from a new IP address when you visit a particular website. To create a new identity:

Step 1. Click button to open the Tor Browser settings menu.


Image 1. Creation new personality in Tor Browser

Step 2. Select paragraph New identity.

Tor Browser will clear your browsing history and cookies, then restart and you will continue using a different IP address.

4.3. NoScript Add-on

4.4. Tor Browser Update

You will receive notifications about new Tor Browser updates.

Step 1. Click button to display the Tor Browser menu.


Image 1. Tor Browser Settings

Step 2. Select Check for availability Tor updates Browser.


Image 2. Checking for Tor Browser updates

The program will tell you if there is a new version Tor Browser and whether an update is required.


Image 3. Program updates

FAQ

Question. Why should I Tor Browser?

Answer. Tor Browseruseful program, if you need to bypass censorship and access certain sites. Tor Browser is useful if you don't want your ISP to know what sites you visit. The program also hides your location on the Internet from websites.

Question. I'm launching Tor Browser; Now all programs that go online work through the Tor network?

Answer. No, by default only what you are working with is sent through the Tor network. Tor Browser. Other programs work as usual - directly through your Internet access provider. You can find out if the Tor network is working by going to test Tor page by the address https://check.torproject.org. Tor's developers also expect people to be careful, use common sense, and use common sense when accessing new and unfamiliar websites.

Question. Is what I'm doing encrypted? Tor Browser?

Answer. Tor encrypts all communications inside Tor networks. Keep in mind that Tor cannot encrypt data that leaves the Tor network. To protect data between Tor exit node and the site you are linking to, it's still better to use HTTPS.

Tor Browser - anonymous browser to bypass blocking of web resources. It is easy to use, does not require resources, and is quickly installed and configured. With its help, you can access any sites and even the deep Internet, which is not indexed. Sometimes situations happen that make it still impossible to work with blocked sites.

What to do if Tor Browser does not connect to the network? There are several options to resolve connection loss. Check the effectiveness of each method until the problem is resolved.

Method 1: Update

The answer to the question why Tor does not work may be outdated software. Exactly outdated version one of the most popular reasons incorrect operation any program.

Method 2: Reconnecting bridges

If Tor is installed correctly and the bridges are configured correctly, but there is still no connection, filters may be the reason. They block encrypted requests to the Tor directory. After updating the browser, disconnections are rare, but do occur. To continue anonymously using the network, you need to reconfigure the bridges. How to connect them? Follow the instructions below.


Method 3: Reinstallation

If redefining bridges does not help, reinstall. There are two options for how to do this, depending on the version of the program. If installed stable version, follow these steps.

Once the program is installed, configure the ports. If the user prefers to work with

We told you how to use VPN in your daily work.

Today I would like to tell you in detail about the distributed anonymous network Tor.

IN Lately in RuNet, with the arrival of state regulators and the tightening of their position against ordinary network users, (see our articles about state regulation of the Internet: and) there is a discussion about the fate of the Tor network and other anonymizing services.

News has already appeared in the press about the “ban of Tor” at the instigation of Russian security forces:

The Public Council under the FSB of Russia considers it necessary to improve the legal regulation of the activities of legal and individuals distributing information on the Internet. In connection with this council, proposals were made to legislators on the need to ban the use of anonymizers - programs that mask information data and the IP address of users.

The fact is that if, by a court decision, Internet users’ access to a certain site is blocked, the latter, with the help of anonymizers, will be able to visit the pages of the blocked site. For example, with the help of these programs, users in China and Belarus very successfully access those sites to which local authorities block access.

The initiative of the security forces implies a ban software or browsers with a built-in anonymizer (such as Tor browser). In addition, masking tools include web servers - stand-alone sites through which users can special programs go with a changed IP address to a blocked site.

Similar amendments will be made to the federal law"About information information technology and on the protection of information."

However, the position of government regulators on this matter has not yet been finally determined:

The Public Council under the Russian FSB has denied reports about the development of recommendations limiting freedom on the Internet. TASS-Telecom reported this on June 5.

The Council explained that at the meeting dedicated to the issue of Internet security, a variety of opinions were expressed, but no concrete solutions, regarding restrictions on the Internet, was not adopted.

The council, the statement said, "has never made such proposals, made such statements or made any recommendations to the legislature."

What is it needed for? distributed network Tor for the average Internet user? It would seem that any law-abiding citizen should ask the question: “Why should I actually hide (anonymize) my identity on the Internet? I’m not going to do anything criminal, hack websites, for example, or distribute malware, or steal other people’s passwords?” In principle, we have already given an answer to this question in our articles, as well as in articles:

But I would also like to cite a very interesting opinion of one of the developers of free software Tor, which he highlighted in his interview ( The developer of a network anonymity service explained why you need to hide your data on the Internet.”):

Why do ordinary Internet users, those who are supposed to have nothing to hide, need anonymity at all?

The problem is that “nothing to hide” is not at all the same as complete control over all user activity on the Internet government agencies, in which the most ordinary fools work, guided by laws crookedly written by other fools. If such fools don’t like something, they will have to waste their health, time and money in order to prove their innocence, and with an unguaranteed result. Why take risks when you can use something simple? technical means, which is supported by other - this time smart - people?

In addition, along with anonymity, we also gain resistance to network censorship at the state level. Why does an ordinary citizen need to think about which website will be banned by Deputy Pupkin today? This is none of Pupkin’s business, especially if Pupkin will never know where the citizen went today on his own network affairs. The citizen does not interfere with Pupkin’s personal life.

So, we think that our reader has already received comprehensive answers to the question “why should he use Tor?”

Well, now, it’s time to move on to purely practical questions, how the Tor network works and how to install and configure it on your computer.

1. How Tor works

Tor is a network of virtual tunnels that allows you to better protect your privacy and security online. This is how it works: Tor connects your computer to the Internet not directly, but through a chain of three randomly selected computers (so-called relays) that belong to the Tor network.

Everything you send to the Internet via Tor becomes, firstly, anonymous (source hidden) , and secondly, remains encrypted all the way between your computer and the last relay . But after the data leaves the last relay and is sent to its destination Internet address - it goes no longer in encrypted form, but in plain, clear form.

If you are transferring particularly sensitive data - for example, entering your username and password to enter a website - make sure that it works HTTPS protocol(i.e. in address bar written, for example, https http://torproject.org/, not http http://torproject.org/).

2. How to download and install Tor

Various distributions of the Tor package can be downloaded from the project website.

Read more about the settings of this version in our article:

If you yourself want to take part in the Tor project, then you should read about setting up Relay “relay” https://www.torproject.org/docs/tor-doc-relay.html.en

If your provider (or System Administrator) for some reason blocked access to the Tor network project website, then the Tor distribution kit can be requested by e-mail (the request must be made from a gmail account):

To receive the English Tor Browser Package for Windows, send an email to: [email protected] with the word windows in the body of the message. You can leave the "Subject" field empty.

In the same way, you can request the Tor Browser Package for Mac OS ( having written macos-i386), and for Linux (by writing linux-i386 for 32-bit systems or linux-x86_64 for 64-bit systems)

If you need a translated Tor version, write in a letter help. You will receive a response email with instructions and a list of available languages.

4. If you have already installed Tor and it does not work for you, then this may be due to the following reasons:

If your regular internet connection works but Tor can't connect to the network, try the following: open Vidalia control panel, Press Message log and select a tab Advanced settings. It is possible that Tor is not connecting to the network because:

a) Your system clock is off: Make sure the date and time on your computer are set correctly and restart Tor. You may need to synchronize your system clock with the server.

b) You are behind a firewall: To tell Tor to only use ports 80 and 443, open Vidalia control panel, press Settings and Networks "My firewall only allows me to connect to certain ports."

c) Yours antivirus program blocks Tor: Make sure your antivirus program is not blocking Tor from connecting to the network.

d) If Tor is still not working, it is likely that your Internet Service Provider (ISP) is blocking Tor. Very often this can be circumvented with Tor bridges - hidden relays, which are not so easy to block.

If you need to find out why Tor can't connect, send the developers an email at e-mail [email protected] with relevant information from the log log.

How to find a bridge

To use a bridge, you must first discover it; this can be done at bridges.torproject.org, or you can send an email to [email protected]. If you have sent a letter, please make sure you write get bridges in the body of the letter. Without this you will not receive an answer. Please note that you need to send this email from either gmail.com or yahoo.com.

Setting up multiple bridges will make your Tor connection more stable in case some of the bridges become unavailable. There is no guarantee that a bridge in use today will work tomorrow, so you must keep your list of bridges up to date.

How to use the bridge

If you can use multiple bridges, open Vidalia control panel, press Settings, then Networks, and put a tick where it says "My ISP is blocking connection to the Tor network". Enter the list of bridges in the field below, click OK and restart Tor.

How to use open proxy

If using a bridge doesn't get you anywhere, try configuring Tor to use an HTTPS or SOCKS proxy to access the Tor network. This means that even if Tor is blocked in your local network, can be used safely open proxy servers to connect to the Tor network and the censorship-free Internet.

For next steps, you must have functional Tor/Vidalia configurations, and a list of HTTPS, SOCKS4 or SOCKS5 proxies.

Open Vidalia control panel and press Settings.

Click Networks. Select “I use a proxy to access the Internet”.

In field Address, enter address open proxy. This can be a proxy name or an IP address.

Enter proxy port.

Typically, you do not need to enter username and password. If you still need such information, enter it in the appropriate fields.

Select Type for proxy, such as HTTP/HTTPS, SOCKS4, or SOCKS5.

Click OK. Vidalia and Tor are now configured to use a proxy to access the rest of the Tor network.

Today, on the Tor project website you can find many more diverse products for a wide variety of operating systems (Windows, Linux, Mac OS).

5. An anonymization solution has already been implemented using Tor and for mobile platforms, for example for Android:

Tor for smartphones

You can set up Tor on your Android device by installing a package called Orbot. Help for downloading and installing it is available on the Tor Project website.

There are experimental packages for Nokia Maemo/N900 and Apple iOS.

6. The Tor development team launched more a number of anonymizing projects and services, for example, Tails is a Live CD/USB distribution preconfigured to use Tor safely, i.e. anonymizing operating system on Linux based, which provides completely safe and anonymous surfing online.

You can learn about other products and projects of the Tor network on the page.

Tor also allows clients and servers to provide hidden services. That is, you can provide a web server, SSH server etc. without showing your IP address to your users.

Of course, most people don't need this feature. ordinary users the Internet, but if you are still interested, you can read about it here:

TOR browser is perhaps the simplest and most affordable way for an anonymous connection to the Internet. Now we will talk about how to set up the TOR browser on your computer, as well as where to download it and how to install it.

Step No. 1. Download the TOR browser.

TOR browser is free browser, built on Firefox-based. You can download it from the official website of the developer. To do this, you need to go to the website, select a language and click on the “Download” button. After which the installation files will begin downloading.

By default, the site will offer to download the version of the TOP browser that is suitable for your operating system. If you want to download a version for another OS, you can do so.

Step No. 2. Installing the TOR browser.

At the TOP installation stage, the browser does not require any additional settings. Everything happens automatically, you just need to follow the instructions that will appear on the screen. So first you need to select your browser language.

And then the folder in which the TOR browser will be installed.

Then all you have to do is wait until the installation is completed.

Step No. 3. Launch and configure the Tor browser.

After launching the TOR browser, a window called “ Network settings TOR".

There are two buttons available here: Connect and Configure. If you click on the “Connect” button, the TOP browser will start working with standard settings. This option Suitable for most occasions.

The “Configure” button will launch manual setting TOR browser. This option may be useful if you connect to the Internet through a proxy server or if your Internet provider blocks the TOR network. First of all, the TOR browser will first ask whether your Internet provider is blocking the TOR network. If there are no problems connecting to the TOR network or you don’t know for sure, then select the “NO” option.

If you select “Yes”, the TOR browser will offer to configure bridges. A bridge is a point in the TOR network whose address is not published in the TOR documentation. You can download the list of bridges on the website.

After setting up TOP bridges, the browser will prompt you to configure an Internet connection through a proxy server. If you connect to the Internet directly (without using a proxy server), then you need to select the “NO” option here.

If a proxy server is used to connect to the Internet, then you need to select the “YES” option and configure the connections. TOR browser will ask you to select the type of proxy server, its IP address, as well as other proxy-related settings.

After setting up the proxy server, you just need to click on the connect button and the TOR browser will connect to the Internet through the TOR network.

Step No. 4. Checking the TOR browser settings.

If you have configured the TOP browser correctly, the following message should appear on the screen: “Congratulations! This browser configured to use TOR."

If the inscription appeared on the screen: “Alas. IN this moment you are not using TOR", this means that with TOR settings There is something wrong with the browser and it was not possible to connect to the TOR network. In this case, you can click on the onion button and select “TOR Network Settings” or simply press the S key on your keyboard.

After which you can re-configure the TOR browser.

Step No. 5. Change the IP address in the TOP browser.

Immediately after connecting to the Internet through the TOR network, you receive a new IP address. But, if necessary, this address can be changed. To do this, you need to click on the button in the form of an onion and select the menu item “New TOR chain for this site.”

After which the page will be updated and you will receive a new IP address. You can check how this works on any website to check the IP address, for example, you can use the website.

Recently, interest in anonymous network constantly growing. And there are many reasons for this..

“Democratic reforms” in the world are in full swing. The governments of almost all countries now sincerely consider themselves to have the right to decide where their citizens go, what to watch and what to read. Bundles of laws, “with the best intentions” churned out by dumas, councils and parliaments, increasingly define the boundaries of the reservations within which the existence of users on the global Internet is now only possible.

“Don’t go there - come here. Otherwise the snow will fall on your head and you will be completely dead” © “Gentlemen of Fortune”.

Another tense moment is the ongoing revelations of Edward Snowden, from which it is clear that the total surveillance of everyone by the special services has already acquired a truly global scale. Of course, the overwhelming majority of people have nothing to hide, but it is extremely unpleasant to realize that you are under the constant surveillance of special forces, your every step is monitored and recorded, and someone regularly tries to pick their naughty little hands in your “dirty laundry.” And it doesn’t matter for what purpose he does it, whether his intentions are good or not.

Why is it needed, this Tor?

All more people They are trying to preserve the inviolability of their private lives from the long nose of the special services. More and more people are trying to get rid of the “fatherly care” of state officials and want to exercise their constitutional right to independently decide where to go, what to choose, where to look and what to do.

And here the anonymous Tor network comes to their aid. Since it can provide an individual with a significant weakening of obsessive attention, simultaneously removing almost all restrictions on movement around World Wide Web. Tor will hide your online identity, hiding everything you did on the Internet and where you went.

In addition, the Tor network has another small practical bonus. It quite often allows you to bypass such an annoying thing as an IP ban on various sites. It's a small thing, but nice.

What is Tor and how does it work

So, what is the anonymous Tor network? Tor is an abbreviation for The Onion Router (for those who do not know bourgeois, but are curious, see the translation in). If anyone is interested in boring technical details, let him stomp on to the Tor page on Wikipedia and figure it out. I would like to be a little simpler - on the same page on Lurkomorye. I’ll try to quickly explain it “on my fingers”.

Although this network operates on the basis regular internet, but in it all the data does not go directly from you to the server and back, as in a “big” network, but everything is sent through a long chain special servers and is encrypted multiple times at each stage. As a result, the final recipient, that is, you, becomes completely anonymous for the sites - instead of your real address, a completely wrong IP is displayed, which has nothing to do with you. All your movements become impossible to track, as well as what you did. And intercepting your traffic also becomes completely useless.

This is in theory. In practice, sometimes things are not so rosy. But about everyone possible problems we'll talk a little later. You're already tired of the long and boring introduction, aren't you? Can't wait to install and try this miracle? Well, let's go!

Let's start using Tor?

Tor is a rather complicated device to install and configure. And in not so ancient times, connecting an ordinary “kettle” to it became a far from trivial task. However, today everything is much simpler. Smart and kind people took all the necessary modules, collected them into a coordinated pile, configured everything as needed and stuffed it into single package. This package is called . And after downloading, all the fuss with it comes down to the usual unpacking and subsequent stomping on the “I want Tor!” button. And Tor appears.

Of course, computer geeks and those who have nothing better to do or want to amuse their feelings can, as before, download everything required modules separately and chew through the multi-page technical “Kama Sutra”, trying to tie it all into a single whole, and somehow set up and launch the resulting structure. Let's wish them good luck, and let's move on to something more rewarding.

I advise you to pay attention to the link on this tab “ Checking Tor Internet Settings" Clicking on it will help you finally make sure that you are actually now on an anonymous network. By the way, there is also a link to a short guide.

So, you are now invisible. However, before your head completely spins from anonymity and imaginary impunity, I will hasten to slightly spoil your mood. Just like that, purely out of personal harm.

I simply have to tell you about some of the “pitfalls” of the Tor network, so that when looking for adventures in your “lower hemispheres,” you don’t hurt them on these stones.

A little security in Tor

So, what Tor cannot protect against. Tor will not be able to protect a person from his own stupidity. If a person has only sawdust instead of brains in his neck growth, or he is purposefully looking for problems for himself, then he will definitely find these problems. And no Tor will help here. Learn to use your brain and exercise basic caution. Tor will also not be able to protect you from chatty programs on your computer. Any plugin or add-on in the browser can instantly “multiply your entire anonymity by zero.” And the browser itself...

That is why the package we are considering uses a specially modified version of Ognelis. By the way, does anyone else need to be reminded that Windows itself is one huge Trojan and a spyware? ( Linux people can breathe freely here - they never worry about such childhood problems of “windows”). Tor will also not be able to protect you from viruses and hackers. Well, it's not designed for that! Get yourself one normal antivirus and firewall, configure them correctly and learn to use them - and sleep well.

The main problems of the anonymous Tor network

Okay, I’m finishing my lyrical digression and moving directly to the problems of the Tor network itself. The first thing that catches your eye is the speed. Page loading speed. Although the words “speed” and “rushing” are clearly inappropriate here. Pages are loading much slower than usual. This is the price for anonymity. The page you requested, before it gets to your browser, hangs around for a long time between servers around the world. It should, however, be recognized that the situation now is much better than a couple of years ago, and it’s quite possible to live at this rate. If you get used to it a little. No matter what, the network is developing and growing stronger.

Intelligence services

Another - and perhaps the main - problem of the Tor network is intelligence agencies. They just can’t come to terms with the fact that crowds of users roam the Internet freely and uncontrollably without their “ all seeing eye" And they are constantly making all kinds of attempts to change the situation. The attempts are varied, even downright criminal. Before viral hacker attacks and hacking, targeted infection of software and servers with Trojans. Although not often, sometimes their efforts end successfully for them, and entire segments fall out of the “onion” network, and a “pative van” comes to one of the unluckiest (or the stupidest, or the most arrogant). But you’re not going to do anything criminal in Tor, are you? This is all to ensure that you do not relax too openly and always remember that Tor is not a panacea, and any anonymity is relative. And if you decide to play gambling with the state, then your capture is only a matter of time.

Officials

In addition to intelligence agencies representing the interests of states, government officials often pose a problem for the anonymous Tor network. The desire to “keep and not let go” in people who have seized power is ineradicable. Occasionally, in relation to some things, this desire is completely justified and fair, but more often than not, it is not. And the bit of freedom granted by Tor acts like a red rag on them. The Tor network is already banned in some countries. Legislatively. There was such an attempt in Russia. So far only in the draft version. Whether and when this project will become law, I do not know. At the moment, the Tor network in Russia operates without restrictions. If they ban it, something else will be found instead. I won’t lay out here verbatim folk wisdom on this matter, but I’ll say it a little softer and more streamlined: “For every action there is a reaction.”

Hackers

Another scourge for Tor is hackers. Some of them are ideological. and some are simply stoned to *** (sorry for the unparliamentary expression). Periodically, most often during a spring or autumn exacerbation, they organize “crusades”, trying to “cleanse the world from filth.” At the same time, the opinion of the world itself does not bother them at all. They feel that they have the right to decide for everyone. Not long ago, there was a “campaign” against, let’s say, unconventional porn on the Tor network. The thing is in this case quite godly. However, along with porn, a bunch of completely white sites were also cut down. Just like that, in passing. And who said that next time they will limit themselves to only this? So know that if your favorite “onion” site suddenly stopped opening, then it is quite possible that these are the actions of one of these with sore brains.

Infected files

Hackers are closely related to the problem with infected files of the Tor Browser. And here the ears of various intelligence agencies are often peeking out, trying to plant their Trojan on you instead of an anonymous network. For example, in App Store they still offer to download the infected Tor Browser. Moreover, the App Store administration was notified about this several times back in the fall. However, the Trojan is still there. Strange situation and strange slowness. True, all the strangeness instantly disappears when you remember that the tender and reverent friendship between Apple Corporation and the US NSA is growing stronger day by day. So download the files of Tor itself exclusively from the official website, or our engine, in fact, will also give you the file directly from the official website.

Minor disadvantages of Tor

The review of more or less serious problems of the Tor network is over. Let's move on to minor troubles. I have already spoken about periodically disappearing sites. Now about Russian sites in this anonymous network. They are few. But they already exist, and there are more and more of them. And even on many foreign-speaking forums there are sections for Russians. So where to wander and who to talk to you will find. However, the main language on the Tor network is still English, and everything delicious on this network is in bourgeois. Although all kinds of dictionaries and dictionaries are always at your service.

Further. It should be remembered that the Tor network is fundamentally not moderated or controlled by anyone. Sometimes some kind of control is found on individual sites when their owners set rules for their visitors. But not more. Therefore, you may well stumble upon things that shock you. Be prepared for this. Also in this network there are various scumbags, outright schizoids, maniacs and other freaks. There are plenty of them on the “big” Internet, but on the anonymous network they feel more comfortable and are not particularly embarrassed. Their percentage is much smaller than government officials are trying to tell us, but they exist. And if you have minor children, I recommend protecting them from Tor.

And in general, I urgently demand that the Internet be protected from children! This will only benefit the Internet. This will make him much safer.

Well, in general, I told all the horror stories. Let me just remind you about viruses that Tor will not protect you from - protect yourself. Well, about anonymity once again - it is never one hundred percent, use your gray matter more often.

And for dessert, a small list of “onion” sites, so to speak, for overclocking.

Goodies and bonuses - a small list of “onion” sites

By the way, if you haven’t realized yet, in Tor Browser you can open both regular sites of the “big” Internet, bypassing some inconveniences, and special sites of the anonymous “onion” network. These sites are located in a special pseudo-domain zone .onion(look carefully at the address). They do not open from the regular Internet. At all. Only from a running and connected Tor Browser.

  • Tor Wiki(http://torwikignoueupfm.onion/) - Directory of Tor links.
  • The Hidden Wiki(http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page) is the first site where every new user of the Tor network should look. Contains links to almost all resources of the “onion” network. Often inaccessible due to huge influx of visitors.
  • The Uncensored Hidden Wiki(http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page) - mirror of The Hidden Wiki. Moderation is minimal.
  • TORDIR(http://dppmfxaacucguzpc.onion/) - a large catalog of “onion” sites.
  • Tor Search(http://kbhpodhnfxl3clb4.onion/), Torgle(http://zw3crggtadila2sg.onion/torgle), TORCH(http://xmh57jrzrnw6insl.onion/) and The Abyss(http://nstmo7lvh4l32epo.onion/) - search engines on the Tor network, at least one of them works.
  • Flibusta(http://flibustahezeous3.onion/) - a mirror of the famous library in the “onion” network (RU language).
  • OnionNet(http://onionnetrtpkrc4f.onion/) - IRC network. The main language of communication is English. Different channels for discussion, even illegal. Additional servers: ftwircdwyhghzw4i.onion, renko743grixe7ob.onion, nissehqau52b5kuo.onion.
  • vTOR“e(http://da36c4h6gxbckn32.onion/) - social network. interest clubs, blogs, forum.
  • RAMP(http://ramp2bombkadwvgz.onion/) - the largest for today trading platform in the Russian-language segment of the Tor network. Recently, there have been a lot of complaints about the actions of the administration and the increasing number of cases of scammers. (So ​​don't click your beak and keep your eyes and ears open) At the same time, the most big choice throughout the entire network. And the highest prices.
  • RUForum(http://ruforumqewhlrqvi.onion/) - Russian-language forum with communication and sale of everything that is not allowed. Recently it has been closed to outsiders. Registration is paid - $10.
  • Amberroad(http://amberoadychffmyw.onion/) is one of the largest shadow trading platforms.
  • Assassination Market(http://assmkedzgorodn7o.onion/) - betting on guessing the date of death of all sorts of bad people. Anyone can add a person to the list or increase the bid on existing positions. At the moment, Barack Obama and Ben Bernanke are in the lead.
  • Hack IT(http://tuwrg72tjmay47uv.onion/) - a live service for hiring hackers.
  • WikiLeaks(http://zbnnr7qzaxlk5tms.onion/) - I hope there is no need to explain what this is? Mirror in the “onion” network (ENG).
  • Onion-Portal(http://ximqy45aat273ha5.onion/) - guide to the “onion” network (RU).
  • http://k4bmdpobhqdguh2y.onion/ - blog about new hidden network services (ENG).
  • Lukochan(http://562tqunvqdece76h.onion/Lukochan/) - large board (ENG, RU).
  • Silk Road(http://silkroadvb5piz3r.onion) - another large anonymous trading platform (ENG).
  • Keys open doors(http://wdnqg3ehh3hvalpe.onion/) - site about hacking game consoles and all kinds of gadgets (ENG).
  • http://n2wrix623bp7vvdc.onion/hackingservices.html - resource about hacking social networks and so on. (ENG).

I intentionally do not cite all kinds of political-revolutionary-partisan resources here. Whoever needs it will find it himself.







2024 gtavrl.ru.