Tor Browser 14.0.2 – Final

The Onion Router ▷ Anonymity Online - Defend yourself against tracking and surveillance

1
2524
To request this update you need to login first.
5 2 votes
Rate It
Tor Browser – Anonymity Online – Defend yourself against tracking and surveillance ▷ Download Now!

Tor Browser is free web browsing software and part of an open network. It helps protect against traffic analysis, a form of network surveillance that threatens personal freedom, privacy, confidential business activities, relationships, and state security.

The browser protects your privacy by routing your communications through a distributed network of relays operated by volunteers worldwide. This prevents anyone monitoring your Internet connection from knowing which sites you visit and stops the sites you visit from identifying your physical location. It also allows access to blocked websites.

Tor Browser allows you to use Tor on Windows, macOS, or Linux without installing software. It can run from a USB flash drive, includes a pre-configured web browser to protect your anonymity, and is fully self-contained (portable).

Tor Browser Futures:

BLOCK TRACKERS

TB isolates each website you visit so third-party trackers and ads can’t follow you. Any cookies are automatically cleared when you’re done browsing. So will your browsing history.

RESIST FINGERPRINTING

The Browser aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information.

MULTI-LAYERED ENCRYPTION

Your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays.

Don’t Torrent over Tor Browser

Torrent file-sharing applications bypass proxy settings and make direct connections even when they should use Tor. Even if your torrent application is configured to connect through Tor, it often reveals your real IP address in the tracker GET request, which is how torrents operate. This compromises the anonymity of your torrent traffic and any other Tor web traffic you are using simultaneously but also slows down the entire Tor network for everyone.

Use HTTPS versions of websites

Tor will encrypt your traffic within the Tor network, but encryption of your traffic to the final destination website depends on that website. To help ensure secure encryption, the browser includes HTTPS Everywhere, which forces the use of HTTPS encryption on major websites that support it. However, you should still check the browser’s URL bar to ensure that websites where you provide sensitive information display a blue or green URL bar button.

Don’t open documents downloaded through Tor while online

The browser will warn you before automatically opening documents handled by external applications. Do not ignore this warning. Be cautious when downloading documents through Tor, especially DOC and PDF files.

Use bridges and find a company

Tor Browser tries to prevent attackers from discovering which websites you visit. However, by default, it does not stop someone monitoring your Internet traffic from knowing that you’re using Tor. If this is a concern, you can reduce the risk by configuring Tor to use a bridge relay instead of connecting directly to the public Tor network.

Supported Operating Systems:

  • Windows 7, 8, 8.1, 10, 11 (32-bit, 64-bit)
  • macOS 10.9 and later.
  • Linux, BSD, and Unix
5 2 votes
Rate It
Subscribe
Notify of
1 Comment
Inline Feedbacks
View all comments