Tor Browser
Free and extensible browser for use with the Tor anonymity networkTor Browser is a Web browser derived from Firefox with strong measures to preserve privacy. Unlike typical browsers, Tor Browser makes all network connections through the anonymity-preserving Tor network, through which you have access to both standard websites and special “Onion” sites that are only available through Tor.
Each version of Tor Browser is built from the latest long-term support (LTS) version of Firefox.
-
Free Software: Free (as in freedom, not price) software puts the user in control by allowing you to use the software for any purpose, modify it, and redistribute it. This also implies that you can examine the source code and see what it does and how it works. This represents a baseline requirement for recommendation in this guide.
-
Supports Interoperability: Interoperability increases freedom and usefulness by allowing different systems to work together. When a service is hostile to other services interoperating, particularly a communication service, this places users in a walled garden, which limits choice and can make it difficult to switch to or from an alternative.
Using Tor
Because Tor Browser connects to a special network, your network traffic can be attributed to usage of Tor by your local network administrator and Internet service provider (ISP). Although these third parties can’t see what you’re doing, they can see that you are using a tool that affords strong anonymity. You could potentially face retaliation for connecting to the Tor network from a network operated under a party who is hostile to freedom of information, such as an oppressive government, or who is simply fearful or overly cautious of technology they don’t understand, such as a university or workplace.
Where Tor is inaccessible because of a block or you otherwise need to conceal your usage of Tor, Tor Browser offers some circumvention measures in the form of Tor Bridges, which let you connect to the network through an alternative route that is more resistant to censorship.
It is strongly recommended that you start by consulting the following resources, so that you can maintain good digital hygiene while using Tor Browser to achieve your goals in accordance with your threat model:
Browser Extensions
Installing extensions in Tor Browser beyond those already included in its standard configuration is inadvisable, since they can weaken the browser’s fingerprinting resistance.
Tor Browser comes with a few extensions installed, including the script-blocker NoScript.