
What is Tor and How To Use It?
Introduction
The internet has become a part of our daily lives. However, every time we do something online, we leave behind a digital footprint. Often, we don’t think about which of our activities and data are being tracked or collected. To help address this issue, a browser called Tor has been developed, allowing users to browse the internet more anonymously and securely. This blog post introduces you to the Tor Browser and its capabilities to make your everyday internet use even safer.
What is Tor? (And Tor’s Advantages Compared to a Regular Browser)
Tor, short for The Onion Router, is a network designed to maximize user privacy. Tor routes all internet traffic through various servers operated by volunteers. At each step, the data is re-encrypted, so that no single server knows both where the traffic came from and where it is headed. As a result, Tor hides your real IP address from your service provider and other potential eavesdroppers.
When you use the Tor Browser, not only is your IP address hidden. The browser also includes other techniques to prevent user deanonymization. For example, the visible size of the browser window is always the same and should not be changed, because a different window size can be information that makes your traffic distinguishable from others.
By default, Tor Browser also includes several extensions that block trackers and disable riskier web components like JavaScript and Flash. It is not recommended to install additional extensions to the Tor Browser, as this could make your browsing footprint more unique and thus easier to track.
What is Tor Used For? (Anonymity and Privacy + Onion Sites)
The Tor Browser is primarily used to achieve anonymity online. Tor users include journalists, privacy enthusiasts, and also cybercriminals. Since the browser provides complete user privacy, it is heavily used by criminals.
Most tech-savvy people have heard of the infamous underground marketplace called Silk Road, which focused on selling various narcotics. Access to this marketplace was only possible through the Tor Browser.
Besides criminal use, Tor is also widely used by individuals who want to protect their privacy. For example, the browser is popular among whistleblowers who reveal unlawful or unethical behavior by companies or governments.
Using Tor Browser, you can access both the regular internet (.com, .ee domains) and .onion websites. Onion sites are only accessible through the Tor network. The domain names of onion sites are generated automatically, making them look unusual compared to regular web addresses. These domains are usually 16 or 56 characters long, making them hard to memorize. To solve this problem, there are various search engines, such as DuckDuckGo and The Hidden Wiki, that help users find different onion sites, from blogs to online shops.
How to use Tor?
Setting up Tor is simple. Here are the basic steps to using Tor:
- Download and Install the Tor Browser
The easiest way to use Tor is through the Tor Browser, a customized version of Mozilla Firefox. It is available for Windows, macOS, Linux, and even Android.
Always download the Tor Browser from the official website to avoid malicious software.
- Install and Launch
After downloading, install the browser and open it. Upon the first launch, the Tor Browser will offer you the option to either connect immediately or configure the connection if you are in a country where Tor is restricted.
- Browse Safely
The Tor Browser will automatically connect you to the Tor network and allow you to start anonymous browsing. Here are a few tips for safe use:
- Do not log into your personal accounts (e.g., Gmail, Facebook) if you want to stay anonymous.
- Avoid enabling plugins and scripts, as they can compromise your anonymity.
- Close the browser when you finish browsing – all session data will be automatically wiped.
- Stick to the default browser settings, which are optimized for privacy protection.
- Avoid opening files or documents directly through the Tor Browser – instead, download them and open offline in a secure environment.