{"id":205113,"date":"2017-02-05T13:51:08","date_gmt":"2017-02-05T18:51:08","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/how-to-use-tor-browser-for-anonymous-web-browsing.php"},"modified":"2017-02-05T13:51:08","modified_gmt":"2017-02-05T18:51:08","slug":"how-to-use-tor-browser-for-anonymous-web-browsing","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/tor-browser\/how-to-use-tor-browser-for-anonymous-web-browsing.php","title":{"rendered":"How to Use Tor Browser for Anonymous Web Browsing"},"content":{"rendered":"<p><p>Getty Images (Colin Anderson #532029225)  <\/p>\n<p>    With increased scrutiny by employers, schools and even    governments becoming more commonplace, anonymity while browsing    the Web has become a priority. Many users looking for an    enhanced sense of privacy are turning to Tor (The Onion    Router), a network originally created by the U.S. Navy and now    used by countless Web surfers across the globe.  <\/p>\n<p>    Motives for utilizing Tor, which distributes your incoming and    outgoing traffic through a series of virtual tunnels, can range    from reporters aiming to keep their correspondence with a    secret source private to everyday internet users wishing to    reach websites that have been restricted by their service    provider. While some choose to exploit Tor for nefarious    purposes, most Web surfers simply want to stop sites from    tracking their every move or determining their geolocation.  <\/p>\n<p>    The concept of Tor, as well as how to configure your computer    to send and receive packets over the network, can prove    overwhelming even to some Web-savvy veterans. Enter the Tor    Browser Bundle, a software package that can get you up and    running on Tor with minimal user intervention. An open-source    grouping of Tor combined with a modified version of Mozilla's    Firefox browser along with several key features and extensions,    Tor Browser Bundle runs on Windows, Mac and Linux platforms.  <\/p>\n<p>    This tutorial walks you through the process of obtaining and    running Tor Browser Bundle so that your Web communications can    once again become your business and yours alone.  <\/p>\n<p>    Please note that no anonymization method is completely    foolproof, and that even Tor users can be susceptible to prying    eyes from time to time. It is wise to keep that in mind and    always proceed with caution.  <\/p>\n<p>    The Tor Browser Bundle is available for download on a multitude    of sites. However, it is highly recommended that you    only obtain the package files from    torproject.org, the official home of Tor. Users can    choose from over a dozen languages, ranging from English to    Vietnamese.  <\/p>\n<p>    To begin the download process, navigate your current browser to    <a href=\"https:\/\/www.torproject.org\/projects\/torbrowser.html.en\" rel=\"nofollow\">https:\/\/www.torproject.org\/projects\/torbrowser.html.en<\/a>.    Next, scroll down until you find your desired option in the    Language column, clicking on the linkfound under    the header that corresponds to your specific operating system.    Once the download is completed, Windows users should locate the    Tor file and launch it. A folder will now be created at your    specified location, containing all package files and named    Tor Browser. Mac users should double-click on the    downloaded file to open the .dmg image. Once open, drag the Tor    file shown into your Applications folder. Linux users    should utilize the appropriate syntax to extract the downloaded    packageand then launch the Tor Browser file.  <\/p>\n<p>    To ensure that you have received the intended package, and were    not duped by a hacker, you may want to    verify the signature on your downloaded package prior to    utilizing it. To do so you'll need to first install GnuPG and reference the package's    associated .asc file, automatically downloaded as part    of the browser bundle. Visit Tor's signature verification    instructions page for further details.  <\/p>\n<p>    Now that you've downloaded the Tor Browser Bundle and possibly    verified its signature, it's time to launch the application.    That's right - no installation is required! Because of this,    many users opt to run Tor Browser right off of a USB drive rather than    placing its files on their hard drive. This method provides    another level of anonymity, as a search of your local disks    would reveal no trace of Tor whatsoever.  <\/p>\n<p>    First, navigate to the location where you chose to extract the    files described above. Next, within the folder labeled Tor    Browser, double-click on the Start Tor    Browsershortcutor launch it via your operating    system's command line.  <\/p>\n<p>    As soon as the browser is launched a connection to the Tor    Network is typically initiated, depending on your individual    settings.Be patient, as this process can take as little    as a couple of seconds or as long as a few minutes to complete.  <\/p>\n<p>    Once a connection to Tor is established, the Status    screen will disappear and the Tor Browser itself should launch    after a few brief seconds.  <\/p>\n<p>    Tor Browser should now be visible in the foreground. All    incoming and outgoing traffic generated through this browser    will be routed through Tor, providing a relatively safe and    anonymous browsing experience. Upon launch, the Tor Browser    application automatically opens a Web page hosted on    torproject.org which contains a link to test your    network settings. Selecting this link displays your current IP    address on the Tor network. The virtual anonymity cloak is now    on, as you will notice that this is not your actual IP address.  <\/p>\n<p>    If you'd like to view this content in a different language,    utilize the drop-down menu found at the top of the page.  <\/p>\n<p>    In addition to many of the standard Firefox features, such as    the ability to bookmark pages and analyze source via the    integrated Web developer toolset, TorBrowser also    includes a great deal of functionality unique to itself. One of    these components is Torbutton, found on the browser's address    bar. Torbutton allows you to modify specific proxy and security    settings. Most importantly, it provides the option to switch to    a new identity - and therefore a new IP address - with a simple    click of the mouse. Torbutton's options, described below, are    accessible via its drop-down menu.  <\/p>\n<p>    TorBrowser also comes prepackaged with an integrated    version of the popular NoScript add-on. Accessible from a    button on Tor Browser's main toolbar, this custom extension can    be used to either block all scripts from running within the    browser or just those on specific websites. The recommended    setting is Forbid Scripts Globally.  <\/p>\n<p>    Another well-known extension integrated with Tor Browser is    HTTPS Everywhere, developed by the Electronic Frontier    Foundation, which ensures that your communication with many    of the Web's top sites is forcefully encrypted. HTTPS    Everywhere's functionality can be modified or disabled (not    recommended) via its drop-down menu, accessible by first    clicking on the main menu button (located in the upper    right-hand corner of the browser window).  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.lifewire.com\/using-tor-for-anonymous-browsing-445789\" title=\"How to Use Tor Browser for Anonymous Web Browsing\">How to Use Tor Browser for Anonymous Web Browsing<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Getty Images (Colin Anderson #532029225) With increased scrutiny by employers, schools and even governments becoming more commonplace, anonymity while browsing the Web has become a priority. Many users looking for an enhanced sense of privacy are turning to Tor (The Onion Router), a network originally created by the U.S.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/tor-browser\/how-to-use-tor-browser-for-anonymous-web-browsing.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261457],"tags":[],"class_list":["post-205113","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/205113"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=205113"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/205113\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=205113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=205113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=205113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}