【TOR BROWSER】▷ What is it and how does it work? ▷ 2022

There are many rumors and myths about the anonymous Tor browser.. That it is illegal, that it is not safe, that it incriminates you… The truth is that, although it is not the most effective in all aspects, it is very interesting in certain circumstances, such as for , which is the way almost all of us have known it.

TOR is a not very long-lived browser that promises us anonymity and securitywhich is why it is used more and more for all types of queries, in part, fleeing from the aggressive data collection that is done through other browsers and networks.

If you want to keep your data safe and browse calmly, the best thing you can do is cKnow everything about TOR: what this search engine is, how it works, what it offers you, what it is for and how we can access it. We see all this below.

What is it, what is the Tor Browser for and what advantages does it have?

Bull The Onion Router is a Mozilla-based web browser but that, obviously, differs from this in many things, mainly in terms of managing our data. We are talking about an anonymous browser that is part of a project to develop a low-latency communication network that is superimposed on the Internet.

The most notable feature of this project is that the exchange of messages between users does not reveal your identity, maintaining the integrity and secrecy of the information. To do this, create this free softwareThe Onion Router, which is flexible and resistant to many attacks, although it can be improved.

Navigation with it is done by connecting to three layers of encryptionalways looking for the non-compromise of the user’s data. The connection will be transmitted to three different servers located throughout the planet, seeking that the anonymity of those who browse is a guarantee. A) Yes, none of the sites you visit will know where you are visiting from. This action is called Circuit.

In other words, the information that our team sends, data by data, randomly bounces around the connected nodes, in addition to being encrypted. Each of the nodes only knows which node it will bounce to next, but it is impossible for it to decipher the information. The exception is given by the last of these, which, if desired, can obtain the information, but will not know the source.

Browsing is done by connecting to the Tor network. Be careful because the network and the browser are not the same at all. It is maintained by volunteers who donate their bandwidth and has no point of failure or centralized entity, as is the case with . It is, in fact, a kind of peer to peer network, although, in addition to nodes, it also has traffic routers. For enter here.

East will isolate cookies and clear your history after each session to protect both security and privacy. These benefits have some consequences, such as increased loading time or elements that do not work.

See also  【 WEB 】 Guides and Complete Lists 100% Updated ▷ 2022

It is also important to highlight that, with time of observation, we can end up discoveringalthough that is something that would require the attention of someone who wanted to identify us, something that will not be common if we do not do anything remarkable.

Steps to download and install Tor Browser on your computer

If you want to download Tor anonymous browser, don’t worry because it is not complicated at all. We teach you how to do it from the three main operating systems: Windows, Mac and Linux.

for windows

Using Tor on Windows requires:

  • . Click on the version of your choice.
  • This will make you have a file called “Start TOR Browser” which you will have to execute to start the “facility“, which is nothing more than the choice of browser hosting.
  • You will have to choose the route of your interest, that is, the place where you want it to stay.
  • When you want to start using the browser, all you have to do is double-click.
  • Opening the browser will take a few seconds, which are the ones needed to connect to the TOR network. For this reason, a status box will appear that will disappear quickly.
  • When the time comes, the browser will start and you can use it. Of course, the best thing is that you take a look at its configuration and modify it to your liking considering the ISP, firewall or proxy.
  • Currently you have a tutorial offered by own TOR Project within the browser itself, on the main page that appears as soon as you open it. This is on the top left; You just have to click on the globe icon and it will start.

for Mac

  • . Choose the version you prefer.
  • Depending on the browser you are using at the time, you will be asked if you want to save the file or open it or, directly, it will be downloaded in the predestined folder for it. If you have the possibility, always choose to save the file instead of opening it directly.
  • If you do not have the third-party download option enabled, you will have to do it by entering the “Configuration and security” and whom “Privacy”.
  • When you want to continue, you just have to go to the download folder where the file has been saved and double click about him.
  • A verification will be carried out by the team to ensure that there is no manipulation of the file and the installation will begin, which will be done, by default, in the folder “Applications“.
  • You may run it both from this folder and from your Launchpad.
  • The result will be a source warning box. Click on “Open“.
  • On this first occasion we will be given the option to make some modifications. You can now make the configuration according to your preferences or click directly on “Connect“.
  • When you connect, a process window will open that tells you that the connection to the network is being made.
  • you only have left start the tutorial by clicking on the globe icon in the upper left corner of your home page.
See also  【 Create Evergreen Content on YouTube 】 Step by Step Guide ▷ 2022

for linux

  • . You have different options so you just have to choose the most convenient for you.
  • You will be asked if you want save installer. Do it. This will start your download. A few moments later you will have it in your default download folder.
  • now you have to open terminal work, either from the desktop or from the dock or simply with the commands Alt+Ctrl+T.
  • You have to go to the folder “downloads” including command “cd Downloads” and pressing “Enter“. If the download has been made in another place, you will simply have to command to that location.
  • It is time to extract the content of the installer with the command “tar – xvJf full file name“.
  • You will find the folder that contains the browser. You have to open it by commanding “cd folder name” (for example, tor-browser_en).
  • Now you have to run the browser with the command “./start-tor-browser.desktop“.
  • The browser window will now open. Click on “Connect” either “Connect” to start using it.
    • You also have the option to configure certain aspects, which you can do now or later.
  • When you connect you will have the option to start use the browser through a tutorial with which you will learn how to use it quite simply.

How to configure Tor anonymous browser correctly to browse the deep web without risk?

We have already seen that one of the main reasons why many people use this browser is out of curiosity about access the deep websomething impossible to do from conventional browsers such as Mozilla, Chrome, Safari, etc.

Nevertheless, accessing this type of content can be very insecurewhich is why we advise you to make some settings to browse the deep web safely.

In any case, our advice is that you do the following checks even if you do not enter the deep web; The configuration of a browser is very important, it does not matter if it is Tor or any other.

security settings

For it:

  • Click on it onion icon that you will find at the beginning of the top bar.
  • Now click on “Security settings“.
  • A new window will open that allows you Choose between three levels of security:
    • “Standard”
    • “Safer”
    • “The safest”
  • According to the selections you will see the aspects that include each of them. Choose the one of your choice.
  • Click on “To accept“.

TOR Anonymous Browser Network Configuration

Now we will do the same with the network:

  • go to the onion again.
  • On this occasion you will have to click on “Tor network configuration“.
  • Here you will find three options that you can check:
    • Tor is censored in my country“. Find out about it and, if so, check.
      • That being the case, you will have the options of choosing a bridge, requesting it, or providing it.
    • I use a proxy to connect to the Internet“. There is no problem in that, if it is your case, check the box.
      • In this case, a form will appear to indicate the type of proxy you are using, its address, the port and the option to establish a username and password.
    • This computer goes through a firewall that only allows connections to certain ports“. This will depend on the configuration you have in your firewall.
      • If you enable it, you will have to indicate which ports are allowed.
  • Once you have checked the corresponding boxes, click on “To accept“.
See also  【Zoom Screen Sharing】Step by Step Guide ▷ 2022

To update

It is essential to always keep the browser updated. Our advice is to do it daily.

  • Click on the icon of the onion.
  • Now in “Check Tor Browser Update“.
  • A window will appear that tells you if there is an update or not and, if so, you will be allowed to do so.

Privacy & Security

  • Click on the icon three barsup to the right.
  • Now go to “Options“.
  • Of the three tabs on the left, click on “Privacy & Security“.
  • Various options will appear in relation to forms and passwords, history, cookies, the address bar, protection against tracking, permissions, data use, security and certificates. choose wisely what you want to give and receive from the browser and browsing experience.

How to use Tor Browser?

Once you have made the corresponding configuration, let’s see how to start using the TOR browser. To do this, we are going to see all the points that we can treat from this software.

Icon onion or TORButton

We have already seen three of the four options for this icon. The last one, which in turn is the first one offered to us, is “new identity“. If we press it, a window will open alerting us that the windows and tabs will be closed and asking us if that is what we want. We are also given the option of not receiving the notice again.

the new identity means to restore everything, that is, to eliminate all traces of what happened in that session, clearing history, closing sites, etc.

planet icon

East takes you to a simple tutorial.

Option menu

The icon with three horizontal bars It takes us, as it happens with any other browser, to a series of options:

  • New window. Open another browser window.
  • new identity. Idem that if we do it from the icon of the onion.
  • New TOR circuit…
Loading Facebook Comments ...
Loading Disqus Comments ...