Download Tor
Want Tor to really work?
...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. Read the full list of warnings.
|
The Tor Browser Bundle contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run. |
Language |
Version |
Platform |
Source Code |
English (en-US) |
1.3.10 |
Download
(sig)
|
Download Tarball
(sig)
|
English (en-US) |
1.0.13 |
Download
(sig)
|
|
English (en-US) |
1.0.2 |
Download
(sig)
|
|
|
The Tor Browser Bundle contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run. |
Language |
Version |
Platform |
Source Code |
English (en-US) |
1.3.10 |
Download
(sig)
|
Download Tarball
(sig)
|
|
...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. There are several major pitfalls to watch out for:
-
Tor only protects Internet applications that are configured to
send their traffic through Tor — it doesn't magically anonymize
all your traffic just because you install it. We recommend you
use Firefox with the Torbutton extension.
-
Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer,
Quicktime, Adobe's PDF plugin, and others: they can be manipulated
into revealing your IP address. For example, that means Youtube is
disabled. If you really need your Youtube, you can reconfigure Torbutton to allow it; but
be aware that you're opening yourself up to potential attack. Also,
extensions like Google toolbar look up more information about the
websites you type in: they may bypass Tor and/or broadcast sensitive
information. Some people prefer using two browsers (one for Tor, one
for unsafe browsing).
-
Beware of cookies: if you ever browse without Tor and a site gives
you a cookie, that cookie could identify you even when you start
using Tor again. Torbutton tries to handle your cookies safely. CookieCuller can help
protect any cookies you do not want to lose.
-
Tor anonymizes the origin of your traffic, and it encrypts everything
between you and the Tor network and everything inside the Tor network,
but it
can't encrypt your traffic between the Tor network and its final
destination. If you are communicating sensitive information, you
should use as much care as you would on the normal scary Internet —
use HTTPS or other end-to-end encryption and authentication.
-
While Tor blocks attackers on your local network from discovering
or influencing your destination, it opens new risks: malicious or
misconfigured Tor exit nodes can send you the wrong page, or even send
you embedded Java applets disguised as domains you trust. Be careful
opening documents or applications you download through Tor, unless you've
verified their integrity.
Be smart and learn more. Understand what Tor does and does not offer.
This list of pitfalls isn't complete, and we need your
help identifying and documenting
all the issues.