Surf with anonymity using the Tor browser. Heres how to install Tor on a Linux desktop. Ubuntu users beware: The Tor project recommends not installing Tor from Ubuntus regular software repositories.
In casual speech, we use the terms internet and web interchangeably. But actually, the web and the internet are two very different things. If websites were premisesshops, factories, entertainment centersthe internet would be the roads and highways linking them together.
The internet supports many services. The world wide web is just one of them. Other services like email, RDP, DNS, NNTPare delivered over the internet, and none of these are websites.
Overlay networks also make use of the internet. The Tor (The Onion Router) network is one such overlay network. It provides anonymity and privacy to users. With Tor, if you use it effectively, no one can trace your activity back to your IP address.
The traffic that passes along the Tor network is encrypted. Whilst this helps preserve the anonymity of the people using it, the encryption causes a networking problem. The regular routing and switching elements of the internet cannot work with Tor network traffic.
A network of Tor relays, hosted and maintained by volunteers, performs the switching and routing instead. The Tor relays intentionally bounce your connection between multiple relays, even if that routing is not required to reach your destination. This bouncing is another reason Tor makes it virtually impossible to back-track and identify the person at the far end.
It is the strength of that anonymity that has lead to the Tor network being used to host many web sites that engage in criminal activity. The Tor network forms a large part of the dark web. Its not all illegal activity on the Tor network, however. Dissidents in repressive regimes, anonymous press sources, whistleblowers, activists, and the military all use Tor for legitimate reasons.
The trouble is, precisely what makes it an attractive proposition for those people also makes it an attractive proposition for the bad guys.
Tor hidden services have addresses ending in the .onion suffix. They wont show up on Google, and they cannot be viewed or accessed using a normal internet browser.You must use the Tor browser to visit those sites, but you can also use it to access normal websites with additional anonymity.
RELATED: How to Access .onion Sites (Also Known as Tor Hidden Services)
Note that the Tor Project advises against installing pre-packaged versions of the Tor browser from the Ubuntu repositories, saying they have not reliably been updated by the Ubuntu community in the past. Only install it from the official Tor Project website. The Tor Project also offers official repositories for Ubuntu and Debian, but the following manual instructions will work on any Linux distribution.
Browse to the Tor project download page and click on the penguin.
If your browser offers to open or save the file, choose the save file option.
Lets assume the file is saved to the Downloads directory.
When future versions of the Tor browser are released the version numbers in the filename will change. Also, part of the filename indicates the language. In this example, en-US means English, US.
If youve downloaded a different language version, or youre following these instructions at a point in the future where the browser version has changed,substitute the file names and directory names that you are actually working with for the file names and directory names used in these instructions.
The downloaded file is a .tar.xz file. We need to uncompress and untar it so that we can use its contents.
RELATED: How to Extract Files From a .tar.gz or .tar.bz2 File on Linux
There are several ways to do this. If you right-click on the file, a context menu will appear. Select Extract Here from the menu.
If your context menu does not have an Extract Here option, close it and double-click the downloaded file. Your file manager might extract the file contents for you.
If that doesnt work, open a terminal window in your Downloads directory and use the following command. Note that the J in xvJf is in uppercase.
So, one way or another, the file will be uncompressed and untarred for you. A new directory will be created in the Downloads folder.
Double-click the new directory so that the file manager changes into that directory. Like Russian dolls, theres another directory inside the first one.
You have a choice here.
Now that you have downloaded and extracted the Tor browser, you can go ahead and use it, with no further installation steps. Or you can perform a tighter level of integration with a system level installation.
The operation of the Tor browser is identical in both cases, and security updates and bug fix patches will find and update the browser either way.
You may prefer the Tor browser to have as light a touch on your computer as possible. If you feel happier without embedding the Tor browser into your system thats perfectly fine. You will be every bit as anonymous and protected when you use it directly from this directory as you are when you use it after a system level installation. If this is your preferred approach, follow the instructions in the section titled Using the Tor Browser From the Tor Directory.
If youd like the Tor browser to be recognized as an installed application by your desktop environment and have it appear in the application menus and application searches, follow the instructions in the section titled System Level Integration.
To start the Tor browser directly from the directory, open a terminal window at this location and issue the following command:
You can now skip ahead in this article to the section titledHow to Configure the Tor Browser.
Open a terminal window at this location. To install the Tor browser into a system folder, youll need to move this directory, tor-browser_en-US, into the /opt directory. This is the usual location for user installed programs in Linux. We can do this with the following command. Note that you need to use sudo and youll be prompted for your password.
The folder will move to the new location and will vanish from the file manager window. In the terminal window change directory so that you are in the /opt/tor-browser_en-US directory.
Using ls to list the contents of this directory we see another directory and a file with a .desktop extension. We need to run the .desktop file to register the application with your desktop environment.
The installation sequence described above was tested on the current Ubuntu, Fedora, and Manjaro Linux distributions. Pressing the Super key (the one between the left hand Ctrl and Alt keys) and typing tor brought up the Tor Browser icon in all cases.
Clicking the icon launches the Tor browser.
The first time the Tor browser is launched a dialog window appears.
If you access the internet through a proxy, or if you are located in a country that tries to censor the use of tools like Tor, you should click the Configure button.
If neither of those applies to you, click the Connect button.
Clicking the Configure button allows you to set a proxy or to configure a bridge to let you use Tor in countries where its use is restricted.
Well look at the censorship options first.
Select the Tor is Censored in My Country checkbox. Aset of three options will appear.
These options give you different ways to configure a bridge. Bridges are alternative entry-points into the Tor network. They are not listed publicly.Using a bridge makes it much more difficult for your internet service provider to detect that you are using Tor.
The first option allows you to select a built-in bridge. Click on the Select a Built-in Bridge radio button, and choose one of the bridges from the Select a Bridge dropdown menu.
The second option is to request an alternative bridge.
Click on the Request a Bridge From Torproject.com radio button, and click the Request a New Bridge button.
When you click the Request a New Bridge button, you will be asked to complete a Captcha to prove youre a human.
The third option is for when you already have the details of a bridge that you trust and have used before, and you wish to use that bridge again.
Click the Provide a Bridge I Know radio button and enter the details of the bridge you wish to use.
When you have configured your bridge using one of these options, click the Connect button to launch the Tor browser.
If you connect to the internet through a proxy, you need to provide the proxy details to the Tor browser.
Click on the I Use a Proxy to Connect to the Internet radio button. A new set of options will appear.
If you have set up your own proxy, you will know the connection details for it. If you are on a corporate network or someone else set up the proxy, you will need to get the connection details from them.
You will need to provide the IP address or the network name of the device acting as the proxy, and which port to use. If the proxy requires authentication, you must also provide a username and password.
Click on the Select a Proxy Type button to select the proxy type from the dropdown menu, then complete the other fields.
When you have configured your proxy, click the Connect button to launch the Tor browser.
You will see a progress bar as the connection to the Tor network is established.
Soon you will see the Tor browser main window.
If it looks a lot like Firefox, thats because it is Firefox, tweaked and configured to work on the Tor network.
But be careful. Just because you are familiar with Firefox dont adjust any of the configuration settings. And dont install any add-ons. Doing either of these will affect the ability of the Tor browser to mask your identity. And if you do that theres hardly any point to using the Tor browser in the first place.
You can put any web site address in the address bar, and the Tor browser will happily browse to that web site. But using the Tor browser to do general web browsing will give you an inferior user experience compared to a standard browser.
Because your connection is bounced around the network of Tor relays your connection will be slower. And to maintain your anonymity, certain parts of websites might not work correctly. Flash and other technologieseven some fontswill be prevented from operating or displaying as usual.
The Tor browser is best reserved for those occasions when you value anonymity above the user experience, and for when you need to visit a .onion web site.
Some websites have a presence on the clear web and a presence on the Tor network. The search engine Duck Duck Go does this, for example. The Tor browser has a quick way for you to connect to the Duck Duck Go .onion site.
Click on the New to Tor Browser? link in the top left corner of the browser window.
Now click on the Onion Services link, then click the Visit an Onion button.
You will be taken to the Duck Duck Go .onion site.
Click on the green onion logo in the site information field, and youll see the route your connection has taken to the .onion site youre currently viewing.
The route your connection has taken is called its circuit. In this example, the route starts in the UK, and goes via France to the US, and then through another set of unnamed relays before finally arriving at the Duck Duck Go .onion site.
Click on the shield icon in the top right of the browser toolbar to see your current security level.
More:
How to Install and Use the Tor Browser on Linux
- Tor Browser Has a New WebTunnel Feature to Avoid Censorship - How-To Geek - March 14th, 2024 [March 14th, 2024]
- The CIA Is Now Trying to Recruit Russian Spies On Telegram - TIME - May 18th, 2023 [May 18th, 2023]
- Dark Web Alerts: Identifying Criminal Data Exposure on the Dark Web - Security Boulevard - May 18th, 2023 [May 18th, 2023]
- Mullvad aces security audit with this new privacy tool - TechRadar - May 18th, 2023 [May 18th, 2023]
- Billions of Google Chrome users warned to avoid browser over red alert privacy concerns check your sett... - The US Sun - May 18th, 2023 [May 18th, 2023]
- How the decision on Space Command's home will be made - POLITICO - May 18th, 2023 [May 18th, 2023]
- Bitcoin Mixers: Clearnet vs. Darknet Which Offers Greater Anonymity? - Crypto Mode - April 27th, 2023 [April 27th, 2023]
- Matt Taibbi: Report on the Censorship-Industrial Complex - Scheerpost.com - April 27th, 2023 [April 27th, 2023]
- The Ultimate 2023 Guide to The Tor Browser Explained - Pixel Privacy - January 31st, 2023 [January 31st, 2023]
- What is Tor & How Do You Use It? Microsoft 365 - January 17th, 2023 [January 17th, 2023]
- Improving privacy when browsing web: Alternative browsers and chrome extensions - HackRead - October 19th, 2022 [October 19th, 2022]
- Tor Browser Bundle - Free download and software reviews - CNET Download - October 11th, 2022 [October 11th, 2022]
- Hacktivists seek to aid Iran protests with cyberattacks and tips on how to bypass internet censorship - CNBC - October 11th, 2022 [October 11th, 2022]
- This security firm claims to have the right tool for your privacy, and it's not a VPN - TechRadar - September 15th, 2022 [September 15th, 2022]
- A VPN Isn't the Only Way to Change Your IP Address - CNET - September 11th, 2022 [September 11th, 2022]
- Hi, I'll be your ransomware negotiator today but don't tell the crooks that - The Register - August 6th, 2022 [August 6th, 2022]
- Rewards for Justice Reward Offer for Information on Russian Interference in U.S. Elections - United States Department of State - Department of State - July 29th, 2022 [July 29th, 2022]
- How Tor Is Fightingand BeatingRussian Censorship - WIRED - July 29th, 2022 [July 29th, 2022]
- What Is Incognito Mode And Should You Be Using It? - Forbes - July 29th, 2022 [July 29th, 2022]
- TOR Browser - Onion VPN on the App Store - July 17th, 2022 [July 17th, 2022]
- Tor Browser now bypasses internet censorship automatically - BleepingComputer - July 17th, 2022 [July 17th, 2022]
- The dangers of the dark web: being safe online - Open Access Government - July 13th, 2022 [July 13th, 2022]
- Tor vs VPN: Which One Should You Use? - Dignited - June 30th, 2022 [June 30th, 2022]
- Rewards for Justice Offers Up to $10 Million for Information on Foreign Interference in US Elections - HS Today - HSToday - June 30th, 2022 [June 30th, 2022]
- Kremlin tightens control over Russians' online lives threatening domestic freedoms and the global internet - Jacksonville Journal-Courier - June 30th, 2022 [June 30th, 2022]
- Defence in Amanda Todd 'sextortion' trial zeroes in on missing data - The Tri-City News - June 30th, 2022 [June 30th, 2022]
- Now that 'Roe' has been overturned, it's up to the tech industry to protect our data - Fast Company - June 30th, 2022 [June 30th, 2022]
- QAnon Is Celebrating the Return of Its Leader After 18 Months of Silence - VICE - June 30th, 2022 [June 30th, 2022]
- 3 ways to find out if your passwords are being sold on the Dark Web - Komando - June 22nd, 2022 [June 22nd, 2022]
- EXPLAINER: EFCC 'Linked Naira Marley to the Dark Web'. Here's What You Need to Know About the Internet's Most Hidden Part - FIJ NG - June 11th, 2022 [June 11th, 2022]
- What is the Dark Web? - AOL - May 28th, 2022 [May 28th, 2022]
- Cookie Banners Can Be AnnoyingHere's How To Block Them - WRAL News - May 28th, 2022 [May 28th, 2022]
- DuckDuckGo tries to explain why its browsers won't block some Microsoft web trackers - The Register - May 28th, 2022 [May 28th, 2022]
- Proton VPN Secure Core: what it is and when you should use it - TechRadar - May 28th, 2022 [May 28th, 2022]
- How to Download & Install Tor Browser in Windows 10 - May 7th, 2022 [May 7th, 2022]
- How to Unblock a Webpage from Behind a Firewall - Beebom - May 7th, 2022 [May 7th, 2022]
- Download Tor Browser For Windows & MAC (Offline Installer) - May 1st, 2022 [May 1st, 2022]
- Tor Browser - Dark Web Portal Exposed | Dark Web Wiki - May 1st, 2022 [May 1st, 2022]
- Top 10 dark web links & Tor websites for 2022 - Surfshark - May 1st, 2022 [May 1st, 2022]
- How to Install the Tor Browser on a Chromebook - May 1st, 2022 [May 1st, 2022]
- How to Anonymous access to the dark web with Tor - BollyInside - May 1st, 2022 [May 1st, 2022]
- How to Change the Tor Browser Language - How-To Geek - April 29th, 2022 [April 29th, 2022]
- Bites of Life: Shining Light on the Dark Web - Macalester College The Mac Weekly - April 29th, 2022 [April 29th, 2022]
- How to protect against the weakest link in cybersecurity THE USERS - Security Boulevard - April 29th, 2022 [April 29th, 2022]
- What Is Dark Social and Why It Matters - Legal Talk Network - April 29th, 2022 [April 29th, 2022]
- IP bans - why they happen and how to prevent them - Oneindia - April 29th, 2022 [April 29th, 2022]
- Deep Web Tor Browser - Tor Links - Onion Links (2022) - April 20th, 2022 [April 20th, 2022]
- The Best VPN for Binance 2022 [How to Use Binance With a VPN] - Cloudwards - April 20th, 2022 [April 20th, 2022]
- Three tactics for security providers in the age of Dark Web collaboration - SecurityInfoWatch - April 20th, 2022 [April 20th, 2022]
- Simple way to Install Tor Browser in Rocky Linux 8 - Linux Shout - March 17th, 2022 [March 17th, 2022]
- Laptop in Veltman apartment had what appeared to be 'hate-related material': docs - Lethbridge News Now - March 17th, 2022 [March 17th, 2022]
- How to Access Blocked Websites anywhere and for Free - BollyInside - March 17th, 2022 [March 17th, 2022]
- Download Tor Browser for Mac - Free - 10.0 - Digital Trends - March 11th, 2022 [March 11th, 2022]
- Open in Tor Browser Get this Extension for Firefox (en-US) - March 11th, 2022 [March 11th, 2022]
- Use Brave Private Browsing with Tor to Hide IP Address - OSXDaily - February 21st, 2022 [February 21st, 2022]
- Are Crypto Transactions More Transparent Than Wire Transfers? - InvestingCube - February 21st, 2022 [February 21st, 2022]
- The Truth about Dark Web Is It Really Dangerous? - Crypto Mode - February 21st, 2022 [February 21st, 2022]
- Tech-Savvy Professionals Among 22 Arrested In Dark Web Narcotics Operation - NDTV - February 15th, 2022 [February 15th, 2022]
- Download Tor Browser for Windows - Free - 11.0.3 - February 1st, 2022 [February 1st, 2022]
- Tor Project heads to Russian court to appeal against censorship - The Daily Swig - February 1st, 2022 [February 1st, 2022]
- Firefox Monitor may remove personal information now from the Internet - Ghacks Technology News - December 9th, 2021 [December 9th, 2021]
- The Real Russia. Today. Reining in an unruly Communist Party Meduza - Meduza - December 9th, 2021 [December 9th, 2021]
- See the stunning mansion Josh Duggar is calling home during his child pornography trial ahead of possible... - The US Sun - December 9th, 2021 [December 9th, 2021]
- Whats the Difference Between the Deep Web and the Dark Web? - How-To Geek - December 9th, 2021 [December 9th, 2021]
- How to Access the Dark Web Complete Guide? - The Bulletin Time - December 7th, 2021 [December 7th, 2021]
- Theres More to Threat Intelligence Than Dark Web Monitoring - Security Boulevard - November 25th, 2021 [November 25th, 2021]
- You have to work on this through the routeras options diet plan, as some items immediately restore previous setup after a forced reboot - ADOTAS - November 25th, 2021 [November 25th, 2021]
- What is Tor (Browser) & How does it work? | CyberNews - November 23rd, 2021 [November 23rd, 2021]
- Privacy-Protective Internet Browser Tor Is Running Low on Servers - Gizmodo - November 23rd, 2021 [November 23rd, 2021]
- Yes, the Internet has become safer but a VPN is still needed - TechGenix - November 19th, 2021 [November 19th, 2021]
- Scots businessman caught with the 'most serious' category of child abuse images jailed - Scottish Daily Record - November 19th, 2021 [November 19th, 2021]
- Anna and Josh Duggar welcomed daughter Madyson Lily on October 23, their 7th child * starcasm.net - Starcasm - November 17th, 2021 [November 17th, 2021]
- Tor Browser (Alpha) 11.0.9 Download | TechSpot - November 5th, 2021 [November 5th, 2021]
- US government offers $10 million bounty for information on Colonial Pipeline hackers - The Verge - November 5th, 2021 [November 5th, 2021]
- The Tor Browser: What is it and why would you use it ... - October 24th, 2021 [October 24th, 2021]
- Tor Explained: What is Tor? How Does It Work? Is It Illegal? - October 21st, 2021 [October 21st, 2021]
- Alternatives to Using a VPN That Provided Excellent Anonymity While Online - TechBullion - October 21st, 2021 [October 21st, 2021]
- Slicing open The Onion Router (Tor) with no tears - ComputerWeekly.com - October 19th, 2021 [October 19th, 2021]
- What is the dark web? - fox4kc.com - October 19th, 2021 [October 19th, 2021]
- Use of VPNs in India spiking because of blocked websites, experts say ban proposal will not help users - India Today - October 19th, 2021 [October 19th, 2021]