Tor Browser 5.0.3

Status
Not open for further replies.

SillyBilly299

Level 17
Thread author
Verified
Top Poster
Well-known
Apr 26, 2015
815
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.


The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).
Do you like what we do? Please consider making a donation.

Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2). Make sure you have at least 80MB of free disk space in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk.

Click Install (3) Wait until the installer finishes. This may take a few minutes to complete.

tbb-screenshot1.jpg


Once the installation is complete, click Finish to launch Tor Browser's wizard.

Once you see Tor Browser's wizard click Connect

Alternatively, you can launch Tor Browser by going to the folder Tor Browser which can be found at the location you saved the bundle at (Default: Desktop) and double click on the Start Tor Browser application.

tbb-screenshot2.jpg


Once Tor is ready, Tor Browser will automatically be opened. Only web pages visited through Tor Browser will be sent via Tor. Other web browsers such as Internet Explorer are not affected.

Once you are finished browsing, close any open Tor Browser windows by clicking on the
tbb-close-button.png
(6). For privacy reasons, the list of web pages you visited and any cookies will be deleted.


tbb-screenshot3.jpg


To use the Tor Browser again, double click on the "Start Tor Browser" application.

Remember that Tor anonymizes the origin of your traffic, and it encrypts everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication.

Homepage - Download (en-US)
 

Amiga500

Level 12
Verified
Jan 27, 2013
661
How reliable are the relays..?
Not certain about tor,if anything i would assume it would raise your profile,why would you need such anonymity on the web.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top