TOR Installation

When using TOR, remember that TOR does not make your data secure. To prevent a breach in your computer’s security, encrypt and protect your hard drive’s digital data.

Trusting a website in the DarkNet with your anonymity is only as safe as the site you are visiting. A site may track you even without your knowledge. In most cases, they want to know as much about you as you do them! If you have to use an address in your investigation, make sure that the address does not compromise an unwitting individual or compromise your identity.

Setting Up TOR with Added Security

  • System requirements to run the latest version of the TOR: All you need is a somewhat modern computer (2008 or newer) with enough speed and enough RAM to support a current version of your operating system.
  • According to the TOR Project, the developers of TOR, just follow their simple instructions and recommendations.
  • The TOR Project’s best recommendation is to use the TOR browser. Other browsers, like I2P or Freenet, claim to provide the same anonymous browsing experience. TOR does not protect your computer’s Internet traffic when you run it. It only protects applications that are correctly configured to send their Internet traffic through TOR.


Important Security Notes

  • Never use Torrent over TOR. Sending out your true IP address can be dangerous, but sometimes file-sharing applications like Torrent will disregard proxy settings and make a direct connection, exposing your IP address as a result.
  • Never use or install a browser plugin on TOR. There are some applications that can be utilized against you in protecting your anonymity. By enabling browser plugins like Javascript, Flash, RealPlayer, or Quickime, these plugins allow individuals the opportunity to circumvent TOR and gain access to private information about you like your IP address, your browsing history, or even access into your computer.
  • Never open documents that you have downloaded through TOR while you are online. Whenever you download documents from an external application, the TOR browser will alert you that the document may be harmful. Be especially cautious of DOC(x) and PDF files. Just because you may be offline at the time when you decide to view or open the files, the files may contain spyware that will allow the owner of the spyware to learn your true IP address. This is where the use of a virtual machine can come in handy.
  • Use a TOR Bridge when using the TOR browser. Sometimes the use of TOR may be suspicious enough to invoke some party to attempt to track your online activities. In an attempt to blend into your surroundings, appearing that you are not part of the TOR network may be far less suspicious. In this case, TOR browser users utilize a TOR Bridge. The function of a TOR Bridge is to grant the TOR browser an alternative access point to the TOR network and not allow the TOR browser to connect to the TOR network directly.

Click on each tab below:

Note who can see what when using only HTTP.


Note who can see what when using HTTPS rather than HTTP alone.


Note who can see what when using TOR and HTTP.


Note who can see what when using TOR and HTTPS.