Want Tor to really work?
...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. Read the full list of warnings.
Tor Browser Bundle
VersionEverything you need to safely browse the Internet. This package requires no installation. Just extract it and run. Learn more »
Vidalia Bundle
Windows 7, Vista, and XPContains Tor, Vidalia, Polipo, and Torbutton for installation on your system. You need your own Firefox, and you'll need to configure other applications if you want them to use Tor. Installation Guide »
Vidalia Bridge Bundle
Windows 7, Vista, and XPA Vidalia Bundle which is configured to be a bridge by default. This helps censored users reach the Tor network.
Vidalia Relay Bundle
Windows 7, Vista, and XPA Vidalia Bundle which is configured to be a non-exit relay by default. This helps grow the Tor network.
Vidalia Exit Bundle
Windows 7, Vista, and XPA Vidalia Bundle which is configured to be an exit relay by default. Please read these tips for running an exit node with minimal harassment before you get started!
Expert Bundle
Windows 7, Vista, XP, 2000, 2003 Server, ME, and Windows 98SEContains just Tor and nothing else. You'll need to configure Tor and all of your applications manually.
Tor Browser Bundle
VersionEverything you need to safely browse the Internet. This package requires no installation. Just extract it and run. Learn more »
Vidalia Bundle
OS X Intel, OS X Power PCContains Tor, Vidalia, Polipo, and Torbutton for installation on your system. You need your own Firefox, and you'll need to configure other applications if you want them to use Tor. Installation Guide »
Tor Browser Bundle
VersionEverything you need to safely browse the Internet. This package requires no installation. Just extract it and run. Learn more »
Use our repositories for all other Tor-related software.
Android Bundle
For Android-based phones, tablets, and computers.
Nokia Maemo/N900
Source Tarball
Configure with: ./configure && make && src/or/tor
The current stable version of Tor is
The current unstable/alpha version of Tor is
Want Tor to really work?
...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. There are several major pitfalls to watch out for:
- Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. We recommend you use the Tor Browser Bundle. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser.
- Tor Browser and Torbutton block browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated into revealing your IP address. For example, that means Youtube is disabled. If you really need your Youtube, you can reconfigure Torbutton to allow it; but be aware that you're opening yourself up to potential attack. Also, extensions like Google toolbar look up more information about the websites you type in: they may bypass Tor and/or broadcast sensitive information. Some people prefer using two browsers (one for Tor, one for non-Tor browsing).
- Beware of cookies: if you ever browse without Tor and a site gives you a cookie, that cookie could identify you even when you start using Tor again. Torbutton tries to handle your cookies safely. CookieCuller can help protect any cookies you do not want to lose.
- Tor anonymizes the origin of your traffic, and it encrypts everything between you and the Tor network and everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication. HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites.
- While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. Be careful opening documents or applications you download through Tor, unless you've verified their integrity.
- Tor tries to prevent attackers from learning what destinations you connect to. It doesn't prevent somebody watching your traffic from learning that you're using Tor. You can mitigate (but not fully resolve) the risk by using a Tor bridge relay rather than connecting directly to the public Tor network, but ultimately the best protection here is a social approach: the more Tor users there are near you and the more diverse their interests, the less dangerous it will be that you are one of them.
- Do not use BitTorrent and Tor together.
Be smart and learn more. Understand what Tor does and does not offer. This list of pitfalls isn't complete, and we need your help identifying and documenting all the issues.