{"id":182212,"date":"2017-03-08T12:55:15","date_gmt":"2017-03-08T17:55:15","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser-for-windows-online-anonymity-and-censorship-circumvention\/"},"modified":"2017-03-08T12:55:15","modified_gmt":"2017-03-08T17:55:15","slug":"tor-browser-for-windows-online-anonymity-and-censorship-circumvention","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-browser-for-windows-online-anonymity-and-censorship-circumvention\/","title":{"rendered":"Tor Browser for Windows &#8211; Online anonymity and censorship circumvention"},"content":{"rendered":"<p><p>    Posted10 August 2016  <\/p>\n<p>    Tor Browser keeps your online activities    private. It disguises your identity and protects your web    traffic from many forms of internet surveillance.    Tor can also be used to bypass internet    filters.  <\/p>\n<p>    Tor    Browser is an up-to-date, privacy-optimised version of    Mozilla Firefox. It is free and open source software that    enables online anonymity and censorship circumvention. Unlike    other browsers, Tor Browser:  <\/p>\n<p>    The Tor    Browser operates on the Tor network, which runs on    Free and Open Source Software (FLOSS) and which is designed to    enable online anonymity and censorship    circumvention.  <\/p>\n<p>    The Tor network consists of thousands of    servers run by volunteers all over the world. Every time the    Tor Browser makes a new connection, it selects three of these    Tor relays and connects to the Internet    through them. It encrypts each leg of this journey in such a    way that the relays themselves do not know the full path    through which it sends and receives data.  <\/p>\n<p>    When you use the Tor Browser, your internet traffic will appear    to come from a different IP address, often in a    different country. As a result, the Tor Browser hides your IP    address from the websites you access while also hiding the    websites you access from third parties who might try to monitor    your traffic. It also ensures that no single Tor relay can    figure out both your location on the Internet    and the websites you visit (though some of them will    know one or the other).  <\/p>\n<p>    Tor also takes steps to encrypt communications into and    throughout its network. However, this protection does not    extend all the way to websites that are accessible through    unencrypted channels (that is, websites that do not support    HTTPS).  <\/p>\n<p>    Because the Tor Browser hides the connection between you and    the websites you visit, it allows you to browse the Web    anonymously and avoid online tracking. It it also useful for    circumventing online filters so that you can access content    from (or publish content to) websites that would otherwise be    restricted.  <\/p>\n<p>    The following steps illustrate how the Tor network works when    Alice's computer uses Tor Browser to communicate with Bob's    server:  <\/p>\n<p>    Step 1. Alice's Tor Browser obtains a list of    Tor nodes or relays [1] from the Tor directory    server (Dave).  <\/p>\n<p>    Step 2. Alice's Tor Browser picks a random    path through Tor network to the destination server    (Bob). All connections inside Tor network are    encrypted (green [3]). In this example, the    last connection is not-encrypted (red [2]).    The last connection would be encrypted if Alice were    visiting an https website.  <\/p>\n<p>    Step 3. If at the later time, Alice visits    another server (Jane), Alice's Tor Browser    selects a different random path.  <\/p>\n<p>    Note: There is a trade-off between anonymity    and speed. Tor provides anonymity by bouncing your traffic    through volunteer servers in various parts of the world. It    will almost always be slower than a direct connection to the    Internet.  <\/p>\n<p>    Microsoft Windows, Mac OS, GNU\/Linux, Android and iOS    compatible programs:  <\/p>\n<p>    The Tor Browser is available for the    GNU Linux, Mac OS,    Microsoft Windows and Android    operating systems. Tor is the most rigorously    tested tool for keeping your online activities anonymous. Below    are a few other tools that are suitable for circumventing    online censorship and protecting the confidentiality of your    local traffic. Unlike Tor, these tools require    that you trust the service provider:  <\/p>\n<p>    Note: If you are in a location where access to    the Tor Project website is blocked, you can use email to    request a download link that is more likely to work. Send an    email to <a href=\"mailto:gettor@torproject.org\">gettor@torproject.org<\/a> with the    version you need (windows, osx or linux) in the body of the    message. You will receive a response that includes a link to a    Tor Browser archive via Dropbox, Google Docs or Github. Further    details about this feature are available on the    Tor Project    website.  <\/p>\n<p>    Start off by making sure you are on the     Tor Browser download site. (The    https indicates that the connection between    your browser and the website is encrypted, which makes it    harder for an attacker to modify the file that you are about to    download.)  <\/p>\n<p>    Figure 1: Tor Browser page  <\/p>\n<p>    Step 1. Click    [Download Tor Browser] to get directed to the    bottom part of the page, which includes links for downloading    Tor Browser.  <\/p>\n<p>    Figure 2: Tor Browser download links  <\/p>\n<p>    Step 2. Click the appropriate    download link and save the package somewhere convenient (in    your Desktop or Documents folder, for    example, or on a USB storage device).  <\/p>\n<p>    Step 3. Click [Save    File] through the following window to start    downloading Tor Browser:  <\/p>\n<p>    Figure 3: Saving the Tor Browser file  <\/p>\n<p>    You do not have to install the Tor Browser as you would most    software. If you prefer, you can extract it to a USB storage    device, for example, and run it from there.  <\/p>\n<p>    To install the Tor Browser, follow the steps below:  <\/p>\n<p>    Step 1. Navigate to the    folder in which you saved the Tor Browser package. In this    example, we assume you saved the file in your    Downloads folder.  <\/p>\n<p>    Figure 1: The Downloads folder containing the Tor Browser    file  <\/p>\n<p>    Step 2. Right-click on the    Tor Browser file and then click    [Open].  <\/p>\n<p>    Figure 2: Opening the Tor Browser file  <\/p>\n<p>    Step 3. Select the language    you would like to use Tor Browser in and click    [OK].  <\/p>\n<p>    Figure 3: Tor Browser Language Installer  <\/p>\n<p>    Step 4. Select the folder    where you would like to install Tor Browser in. This example    installs Tor Browser on the Desktop.  <\/p>\n<p>    Figure 4: Tor Browser Installation Location  <\/p>\n<p>    Step 5. Once you have chosen where you want to    install Tor Browser, click    [Install]. The following window should appear    while Tor Browser is being installed:  <\/p>\n<p>    Figure 5: Installing Tor Browser  <\/p>\n<p>    Step 6. Click    [Finish] through the following window, to    complete the installation of Tor Browser:  <\/p>\n<p>    Figure 5: Completing the Tor Browser Setup Wizard  <\/p>\n<p>    By selecting [Run Tor Browser] in this window,    you will proceed to running this browser.  <\/p>\n<p>    The first time you launch Tor Browser, it will ask you how it    should connect to the Internet:  <\/p>\n<p>        Direct Access: Select this option if your        access to the Internet is unrestricted and if the use of        Tor is not blocked, banned, or monitored where you are        located.      <\/p>\n<p>        Restricted Access: Select this option if        your access to the Internet is restricted or if the use of        Tor is blocked, banned, or monitored where you are located.      <\/p>\n<p>    After you initially configure and launch Tor Browser it will    continue to connect to the Tor network with no additional    configuration. But you can change these settings at any time    from within the Tor Browser. You may need to change them when    you are travelling, or if the situation changes in your    country. To do so, see Section    3.3, How to reconfigure access to the Tor network.  <\/p>\n<p>    Once you have installed Tor Browser, the Tor Browser Setup    Wizard will direct you to the following window:  <\/p>\n<p>    Figure 1: Tor Network Settings  <\/p>\n<p>    If access to the internet (and to the Tor Network) is    not restricted in your location, perform the following    step to configure Tor Browser:  <\/p>\n<p>    Step 1. Click    [Connect] to launch Tor Browser  <\/p>\n<p>    Figure 2: Connecting to the Tor Network  <\/p>\n<p>    After a few moments, Tor Browser will open:  <\/p>\n<p>    Figure 3: Tor Browser  <\/p>\n<p>    If you want to use the Tor Browser from a location where the    Tor network is blocked, you will have to use a bridge    relay. Bridges are not listed in the public directory    of Tor relays, so they are more difficult to block. Some    bridges also support pluggable transports,    which try to disguise your traffic to and from the Tor network.    This helps prevent online filters from identifying and blocking    bridge relays.  <\/p>\n<p>    The default pluggable transport, called obfs4,    also makes it slightly more difficult for others to figure out    that you are connecting to the Tor network. In general, though,    Tor is not designed to hide the fact that you are using Tor.  <\/p>\n<p>    You can learn more about bridges on the Tor project website.    There are two ways to use bridges. You can enable the    provided bridges or you can request    custom bridges.  <\/p>\n<p>    Once you have installed Tor Browser, the Tor Browser Setup    Wizard will direct you to the following window:  <\/p>\n<p>    Figure 1: Tor Network Settings  <\/p>\n<p>    Step 1. If your connection to the Tor network    is blocked or otherwise censored, Click    [Configure]  <\/p>\n<p>    Note: If you have already configured the Tor    Browser, you can activate the screen below by following the    steps in Section 3.3  <\/p>\n<p>    Figure 2: Tor bridges configuration  <\/p>\n<p>    Step 2. Select    Yes  <\/p>\n<p>    Step 3. Click    [Next] to display the bridge configuration    screen.  <\/p>\n<p>    Figure 3: The bridge configuration screen  <\/p>\n<p>    Step 4. Select    Connect with provided bridges.  <\/p>\n<p>    Step 5. Click    [Next] to display the local proxy    configuration screen.  <\/p>\n<p>    The Tor Browser will now ask if you need to use a local proxy    to access the Internet. The steps below assume that you do not.    If you do, you can check your regular browser settings and copy    over your proxy configuration. (In Firefox you can find these    settings in the Options > Advanced > Network tab of    Connection Settings. In other browsers you might find them    under Internet Options. You can also use the Help feature    within your browser for further assistance.  <\/p>\n<p>    Figure 4: The local proxy configuration screen  <\/p>\n<p>    Step 6. Select    [No].  <\/p>\n<p>    Step 7. Click    [Connect] to launch Tor Browser.  <\/p>\n<p>    Figure 5: Connecting to the Tor network  <\/p>\n<p>    After a few moments, Tor Browser will open.  <\/p>\n<p>    You can also connect to the Tor network through custom    bridges, which are used by fewer people than the    provided bridges and are therefore less likely    to be blocked. If you are unable to access the Tor Project    website, you can request custom bridge addresses by sending an    email to <a href=\"mailto:bridges@torproject.org\">bridges@torproject.org<\/a> using a    Riseup, Gmail or Yahoo account.    Include the phrase, get bridges in the body of    your message  <\/p>\n<p>    If you can access the Tor Project website, you can    obtain custom bridge addresses by visiting    <a href=\"https:\/\/bridges.torproject.org\/options\" rel=\"nofollow\">https:\/\/bridges.torproject.org\/options<\/a> and    following the steps below.  <\/p>\n<p>    Step 1. Click Just give    me bridges!  <\/p>\n<p>    Figure 1: Obtaining Tor bridges  <\/p>\n<p>    Step 2. Fill in the captcha and press enter.  <\/p>\n<p>    Figure 2: Captcha  <\/p>\n<p>    This should display three bridge addresses:  <\/p>\n<p>    Figure 3: Bridge addresses  <\/p>\n<p>    Step 3. Once you have your custom bridge    addresses, you can type them into Tor    Bridge Configuration screen shown below.  <\/p>\n<p>    Note: If you are launching Tor Browser for the    first time, you can find the Tor Bridge Configuration    screen by follow the first few steps of the    previous section. To find this screen if you have already    setup Tor Browser, see the following    section.  <\/p>\n<p>    Figure 4: Tor bridge configuration screen  <\/p>\n<p>    At any stage, if you need to access the Tor Network a different    way, for example if you have travelled to a country that blocks    Tor, you can update your settings from within the browser by    following the steps below:  <\/p>\n<p>    Step 1: Click the  button to    activate the Tor Browser menu  <\/p>\n<p>    Figure 1: The Tor Browser Configuration menu  <\/p>\n<p>    Step 2. Select Tor    Network Settings to change how Tor Browser connects to the    Internet.  <\/p>\n<p>    Figure 2: Tor Network Settings  <\/p>\n<p>    This screen allows you to enable or disable the use of Bridges    and add custom    Bridges, among other configuration changes.  <\/p>\n<p>    When you are done, click [OK]    and restart the Tor Browser.  <\/p>\n<p>    It is important to remember that Tor Browser    only provides anonymity for the things you do within a Tor    Browser window. Your other online activities do not use Tor    just because it is running.  <\/p>\n<p>    Note: In keeping with a policy of     privacy by design, Tor Browser is    configured in such a way that it does not save your browsing    history to your hard drive. Each time you quit Tor Browser,    your browsing history will be deleted.  <\/p>\n<p>    Tor Browser hides your IP address from the websites    you visit. If it is working properly, you should appear to be    accessing websites from a location on the internet that:  <\/p>\n<p>    The simplest way to confirm this is by visiting the Tor    Check website, which is located at <a href=\"https:\/\/check.torproject.org\/\" rel=\"nofollow\">https:\/\/check.torproject.org\/<\/a>.  <\/p>\n<p>    If you are not using Tor, it will display the    following:  <\/p>\n<p>    Figure 1: Tor Check showing that Tor is not working    properly  <\/p>\n<p>    If you are using Tor, it will display the following:  <\/p>\n<p>    Figure 2: Tor Check showing that Tor is working    properly  <\/p>\n<p>    If you want to check your apparent IP address using a service    that is not associated with the Tor Project, there are many    options online. Examples that support https encryption    (which makes it more difficult for someone other than the    service provider to \"fake\" the result) include:  <\/p>\n<p>    If you access these websites without using Tor Browser, they    should display your real IP address, which is linked to your    physical location. If you access them through Tor Browser, they    should display a different IP address.  <\/p>\n<p>    You can create a \"new identity\" for your Tor Browser. When you    do so, Tor Browser will randomly select a new set of Tor    relays, which will make you appear to be coming from a    different IP address when you visit websites.To do this, follow    the steps below:  <\/p>\n<p>    Step 1. Click the  button to    activate the Tor Browser menu  <\/p>\n<p>    Figure 1: Creating a new identity in Tor Browser  <\/p>\n<p>    Step 2. Select [New    Identity] from the menu.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"https:\/\/securityinabox.org\/en\/guide\/torbrowser\/windows\/\" title=\"Tor Browser for Windows - Online anonymity and censorship circumvention\">Tor Browser for Windows - Online anonymity and censorship circumvention<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Posted10 August 2016 Tor Browser keeps your online activities private. It disguises your identity and protects your web traffic from many forms of internet surveillance. Tor can also be used to bypass internet filters.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-browser-for-windows-online-anonymity-and-censorship-circumvention\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-182212","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/182212"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=182212"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/182212\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=182212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=182212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=182212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}