Download Tor

Want Tor to really work?

...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. Read the full list of warnings.

The Tor Browser Bundle contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run.
Language Version Platform Source Code
English (en-US) 1.3.10 Download  (sig) Download Tarball  (sig)
English (en-US) 1.0.13 Download  (sig)
English (en-US) 1.0.2 Download (sig)
The Tor Browser Bundle contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run.
Language Version Platform Source Code
English (en-US) 1.3.10 Download  (sig) Download Tarball (sig)
The Vidalia Bundle contains Tor, Vidalia, and Polipo for installation on your system. You'll need to configure your applications to use it.
Operating System Notes Stable Alpha Installation Guide
Windows Windows 7, Vista, XP, 2003 Server 0.2.1.26/(sig) 0.2.2.17-alpha/(sig) Windows
Mac (x86) Intel only 0.2.1.26/(sig) 0.2.2.16-alpha/(sig) Mac (Intel)
Mac (PPC) PowerPC only 0.2.1.26/(sig) 0.2.2.15-alpha/(sig) Mac (Power PC)
Linux/Unix Redhat/CentOS, Fedora, Debian, Ubuntu, SUSE Read how to use our repositories. Linux/Unix
Device Version Download Installation Guide
Android-based phones, tablets, computers 0.2.2.14-alpha Instructions
iPhone, iPod Touch, iPad Test packages by Marco
Nokia Maemo/N900 Experimental instructions
The Expert Packages contain just Tor and nothing else. You'll need to configure Tor and all of your applications manually.
Operating System Notes Stable Alpha Installation Guide
Windows Windows 7, Vista, XP, 2000, 2003 Server 0.2.1.26 (sig) 0.2.2.17-alpha (sig) Windows
Mac (x86) Intel only 0.2.1.26 (sig) 0.2.2.16-alpha (sig) Mac (Intel)
Mac (PPC) PowerPC only 0.2.1.26 (sig) 0.2.2.15-alpha (sig) Mac (Power PC)
Linux/Unix Redhat/CentOS, Fedora, Debian, Ubuntu, SUSE Read how to use our repositories. Linux/Unix
Source Tarballs ./configure && make && src/or/tor 0.2.1.26 (sig) 0.2.2.17-alpha (sig)

Want Tor to really work?

...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. There are several major pitfalls to watch out for:

  1. Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. We recommend you use Firefox with the Torbutton extension.
  2. Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated into revealing your IP address. For example, that means Youtube is disabled. If you really need your Youtube, you can reconfigure Torbutton to allow it; but be aware that you're opening yourself up to potential attack. Also, extensions like Google toolbar look up more information about the websites you type in: they may bypass Tor and/or broadcast sensitive information. Some people prefer using two browsers (one for Tor, one for unsafe browsing).
  3. Beware of cookies: if you ever browse without Tor and a site gives you a cookie, that cookie could identify you even when you start using Tor again. Torbutton tries to handle your cookies safely. CookieCuller can help protect any cookies you do not want to lose.
  4. Tor anonymizes the origin of your traffic, and it encrypts everything between you and the Tor network and everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication.
  5. While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. Be careful opening documents or applications you download through Tor, unless you've verified their integrity.

Be smart and learn more. Understand what Tor does and does not offer. This list of pitfalls isn't complete, and we need your help identifying and documenting all the issues.

What is the (sig) link?

These are GPG signatures to allow you to verify that your downloaded file is really from The Tor Project and not an imposter.

Learn more »

Having Trouble?