Tor Browser is software that lets you surf the internet and use all web services anonymously. Nobody — not even government organizations, law enforcers, or big corporations — would be able to check your browsing history or track your location.
There are several main categories of Tor Browser users:
Of course, criminals infiltrating the dark web — to exchange information, sell services, or run illegal marketplaces — could theoretically form another category of user.
So while Tor is legal for the most part — except in China, where it’s forbidden; and in Venezuela, Iran, Saudi Arabia, Russia, Turkey, and Egypt, where it’s restricted — it can be used to perpetrate illegal activity. (We trust you’re no criminal, so this shouldn’t matter!)
Short for “The Onion Router,” Tor is based on a technique called onion routing.
This allows Tor to direct internet traffic through a massive global overlay network, thereby hiding its users’ location and other information about their activity — be it on the dark web or on the surface web. Thanks to the onion routing technique, it’s considerably more difficult for a third party to trace individual user activity.
Now let’s get into some more granular detail. Tor applies encryption to different kinds of user data multiple times, while sending it through a circuit of successive, randomly selected Tor relays. Encryption is applied to every level of the application layer in Tor Browser’s communication protocol stack (just like the layers of an onion).
Each relay decrypts a layer of encryption to reveal the next relay in the circuit to pass the remaining encrypted data onto it. Then the final relay decrypts the innermost layer of encryption, sending the original data to its destination, while keeping the IP address of the source hidden.
Considering that any network surveillance relies heavily on the information about the source and destination of data, this technique makes it much harder to trace any kind of network activity to the source.
In terms of privacy, Tor offers the best level of anonymity. This doesn’t necessarily mean that Tor Browser is perfect, but it does provide another layer of security for your day-to-day browsing.
In terms of safety, Tor is perfect for normal web browsing. However, it’s not 100% secure, especially if you use it to access illicit marketplaces or message boards in the dark web.
To help you minimize risk, we’ll get into a few recommendations later on. But one basic tip we’ll share now is that it’d be a great idea to use a VPN while browsing with Tor Browser.
It’s easy! First, go to Tor Project’s website, and click on the “Download Tor Browser” button at the top right corner.
Then, on the Download page, select from any of the major operating systems available (Windows, Linux, Mac, Android). Here’s a detailed, step-by-step guide for each one:
Click the “Download for Windows” button.
Launch the .exe file after it’s downloaded by double-clicking it.
Choose your language and click OK.
Follow the installation prompts.
Click Finish when the installation is complete. And you’re done!
Click on the “Download for Linux” button.
Wait for the setup file to download. After the downloading is finished, go to the directory it was downloaded to. Right-click on the downloaded file and select Extract Here.
After Tor Browser setup files are extracted, double-click on Tor Browser Setup.
Congratulations! Tor Browser is installed and you’re all set.
Click the “Download for OS X” button.
After the downloading is complete, open the Downloads folder and double-click on the file downloaded (TorBrowser-7.0.2-osx64_en-US.dmg).
After the installation is complete, a new window will pop up and request that you drag Tor Browser to the applications folder.
All done! Now Tor Browser is installed on your Mac.
Click on the “Download for Android” button.
Then click Go to Google Play and tap Install.
After the installation is finished, tap Open to launch the Tor Browser application. Then tap Connect to start the connection to the Tor network.
And voila! Tor Browser is now installed on your Android device.
Using Tor Browser is fairly straightforward. In fact, it’s much easier to just start using Tor Browser than to explain how to do so!
But let’s give it a shot. First, launch Tor Browser by clicking on the “Start Tor Browser” shortcut on your desktop.
Tor Browser’s configuration window will pop up. Click Connect.
The Tor Browser homepage will open up in a new window. Now you can use Tor Browser.
If you don’t know where to begin, that’s perfectly understandable. Since sites on the dark web aren’t meant to be indexed, and since they don’t have proper URLs, you’ll probably need to find initial Tor network ( sometimes called the “onionland”) links to begin with.
Here are several articles with links to legal dark websites that will get you started:
Uninstalling Tor Browser is pretty simple, too. For Linux, delete the Tor Browser directory from your computer. For Windows, just remove the Tor Browser folder.
Fully uninstalling Tor Browser from a Mac is slightly more involved. You can uninstall Tor Browser manually by finding the appropriate folder and dragging it into the trash bin. But Tor’s service files will stay on your Mac and require some effort to be deleted as well.
So the better option, if you’re a Mac user, would be to use a third-party uninstalling tool for Mac. For example, Mac App Cleaner & Uninstaller, AppCleaner, or CleanMyMac 3 can do the job.
While using Tor Browser adds an extra layer of protection to your web browsing session, it’s not 100% full-proof. So here are a few basic recommendations to help you stay safe, secure, private, and legal when using Tor Browser.
To keep your identity private, avoid using your real email address, social network accounts, and generally anything that requires your personal info.
Tor Browser lets you stay anonymous, but giving up your personal information on websites could easily render the browser useless. If you use the dark web and want to prevent your Tor activity from being traced, create a virtual identity that’s nothing like your real-world identity.
Many experts advise against using Windows for Tor browsing, as it has the highest number of vulnerabilities and bugs. These can be exploited to inject your system with malicious code or to compromise your confidentiality.
If you can run Tor Browser on Linux instead, you’d be more secure.
Keeping your Tor Browser client, Tor-secured applications, and other systems updated will save you from the latest detected vulnerabilities.
Using these on Tor may expose your data since active content applications normally run with your user account privileges. This would allow websites to track you in ways Tor Browser can’t protect you from.
BitTorrent clients won’t typically encrypt your IP address, which could be shared with torrent trackers and other peers. This is how peer-to-peer file sharing on Tor can quickly expose your identity.
It’s fair to say that for the most part, Tor Browser will keep your content private and your identity secure. But keep in mind that 100% anonymity and privacy aren’t guaranteed.
Still, Tor Browser provides a reliable additional layer of security to protect your privacy and anonymity.
As previously mentioned, Tor Browser uses “onion routing” to protect your internet traffic and hide both your identity and location. However, it has a number of weaknesses and isn’t 100% secure.
One of its vulnerabilities lies in the fact that each server, which essentially operates as another relay in the Tor network, belongs to volunteers. So, users can’t be entirely sure about the security of each relay the data comes from.
This is mostly fine since the encryption allows each relay server to see only the locations of the previous relay and the next one. But the exit node removes the final layer of encryption and has access to the user’s original location. So your location and identity could theoretically be traced by a server acting as an exit node in the Tor network.
Moreover, Tor Browser is also vulnerable to a number of potential hacker attacks (just like other browsers are). Be sure to minimize your risk by following all the security tips and recommendations above.
You have a number of options to disable certain web features that could otherwise compromise your security and/or anonymity.
Just set up Tor Browser’s Security Levels. Keep in mind, though, that increasing Tor Browser’s security levels may prevent certain webpages from functioning properly.
You can access security settings by clicking the shield icon next to the URL bar. Then click on Advanced Security Settings.
Tor Browser offers users three basic security levels: Standard, Safer, and Safest.
All Tor Browser and website features are enabled.
This disables website features often considered to be dangerous. Some sites will lose functionality.
This level only allows website features required for static sites and basic services. These changes affect images, media, and scripts.
Is Tor Browser similar to a VPN (Virtual Private Network), and do you need a VPN if you’re already using Tor?
Recall that Tor passes your data from one node to another while encrypting and then re-encrypting it. By contrast, a VPN simply provides you with a secure, encrypted connection to a remote server located elsewhere.
So while Tor Browser and VPN are different, their functionalities complement each other. Using both would significantly increase your chances of staying anonymous and keeping your data private.
Turning a VPN on before you start using Tor Browser would allow you to hide your original location and IP address even from the exit node relay server which, as you’ll recall, can trace your original location (in the absence of VPN functionality).
Yes, but only if you’re not careful. Remember that a VPN allows you to completely hide your real IP address from any volunteer server in the Tor network.
Moreover, a VPN prevents your ISP from detecting that you’re using Tor, which your ISP would otherwise easily recognize. By providing you with a secure encrypted connection right from the start, a VPN lets you hide all your Tor activity from your ISP. Your VPN provider also won’t see your activity within the Tor network.
That’s why combining Tor Browser with a VPN gives you pretty good privacy and anonymity. You could still be vulnerable, though, if you use active components while browsing through the Tor network, or if you share any private data while on Tor websites.
A number of other networks are similar to Tor, but they differ in the way they’re built, how they approach the browsing process, and the goals they’re meant to achieve. The most popular alternatives to the Tor network include Freenet, I2P, Freepto, Tails, Subgraph OS, and more.
Sure. There are a number of projects that allow you to access the dark web while using a regular web browser. Tor2web, which uses reverse proxies to allow users to access websites with .onion domain names, is the most well-known.
But before you try using Tor2web or one of its alternatives, be forewarned that it’ll most likely be unsafe.
Using the dark web without Tor Browser’s encryption means that your activity will be easily accessible to a number of parties, including your ISP and the operator of the reverse proxy you use to access the dark web.
So, even though it’s technically possible to use the dark web without Tor Browser or one of its alternatives, you’re better off not even trying it. And if you do, please don’t say we didn’t warn you!
How did Tor come to be?
You’ll recall that “Tor” is an acronym for the original name of this project: “The Onion Router.”
Onion routing was originally developed in the mid-1990s by the United States Naval Research Laboratory as a way to keep the U.S. intelligence community’s online communication and data away from prying eyes.
The alpha version of The Onion Routing project, or simply Tor project, was developed by mathematician Paul Syverson and computer scientists Roger Dingledine and Nick Mathewson.
It was launched in September 2002, while the first public version of Tor was presented almost two years later, in August 2004. That same year, the source code of Tor was released by the Naval Research Laboratory under a free license.
In December 2006, Roger Dingledine, Nick Mathewson and a number of other developers of Tor founded The Tor Project, which is a U.S.-based nonprofit organization responsible for maintaining Tor to this day.
Why was Tor Browser made public?
The goal was to use this new technology to protect internet users in the early 2000s from companies that wanted to collect their data.
At the time, Tor Project founders became increasingly concerned with emerging companies and websites that provided their services for free in exchange for user data. Why? Because that valuable data could be sold for profit.
So Tor Browser was publicly launched as a way for users to have full control over how their data might be used.
What is the Dark Web?
Simply put, it’s the part of the internet that exists on darknets, which require specific software, configuration, or authorization to access.
The dark web content isn’t indexed by web search engines, and this makes it part of the deep web, which covers all web content invisible to search engines.
The opposite of the dark web is the surface web (also called the visible web or indexable web). The surface web is the part of the internet available to everyone and searchable by the usual search engines, like Google.
What’s the Dark Web Used For?
The dark web often conjures up images of some kind of dark market, where illegal drugs, weapons, pornography, and various criminal services are sold.
But the truth is, the dark web isn’t inherently so nefarious. It’s just a more private segment of the internet that provides users with much higher levels of anonymity compared with the surface web.
And that’s why criminals love the dark web; it’s easier to run their operations discreetly without getting caught.
But again, this isn’t what the dark web is all about. In fact, some of the most common legal and perfectly ethical resources exist on the dark web:
Is it illegal to use the Dark Web?
No, it’s not. But it’s obviously illegal to use websites with illegal content (which, as we’ve already established, is plentiful on the dark web).
And, to state the obvious, any illegal activity stays illegal even if it was conducted in the dark web.