• Tor browser Russian version. Tor Browser Bundle for safe and anonymous browsing of the Internet

    Recently, interest in anonymous network constantly growing. And there are many reasons for this..

    “Democratic reforms” in the world are in full swing. The governments of almost all countries now sincerely consider themselves to have the right to decide where their citizens go, what to watch and what to read. Bundles of laws, “with the best intentions” churned out by dumas, councils and parliaments, increasingly define the boundaries of the reservations within which the existence of users on the global Internet is now only possible.

    “Don’t go there - come here. Otherwise the snow will fall on your head and you will be completely dead” © “Gentlemen of Fortune”.

    Another tense moment is the ongoing revelations of Edward Snowden, from which it is clear that total surveillance intelligence services for everyone and everyone has already acquired a truly worldwide scale. Of course, the overwhelming majority of people have nothing to hide, but it is extremely unpleasant to realize that you are under the constant surveillance of special forces, your every step is monitored and recorded, and someone regularly tries to pick their naughty little hands in your “dirty laundry.” And it doesn’t matter for what purpose he does it, whether his intentions are good or not.

    Why is it needed, this Tor?

    More and more people are trying to maintain the integrity of their frequent life from the long nose of the special services. More and more people are trying to get rid of the “fatherly care” of state officials and want to exercise their constitutional right to independently decide where to go, what to choose, where to look and what to do.

    And here the anonymous Tor network comes to their aid. Because it can provide an individual with a significant reduction in obsessive attention, simultaneously removing almost all restrictions on movement on the World Wide Web. Tor will hide your online identity, hiding everything you did on the Internet and where you went.

    In addition, the Tor network has another small practical bonus. It quite often allows you to bypass such an annoying thing as an IP ban on various sites. It's a small thing, but nice.

    What is Tor and how does it work

    So, what is the anonymous Tor network? Tor is an abbreviation for The Onion Router (for those who do not know bourgeois, but are curious, see the translation in). If anyone is interested in tedious technical details, let them go to the Tor page on Wikipedia and figure it out. I would like to be a little simpler - on the same page on Lurkomorye. I’ll try to quickly explain it “on my fingers”.

    Although this network operates on the basis of the regular Internet, all data in it does not go directly from you to the server and back, as in a “big” network, but everything is sent through a long chain of special servers and is encrypted many times at each stage. As a result, the final recipient, that is, you, becomes completely anonymous for the sites - instead of your real address, a completely wrong IP is displayed, which has nothing to do with you. All your movements become impossible to track, as well as what you did. And intercepting your traffic also becomes completely useless.

    This is in theory. In practice, sometimes things are not so rosy. But about everyone possible problems we'll talk a little later. You're already tired of the long and boring introduction, aren't you? Can't wait to install and try this miracle? Well, let's go!

    Let's start using Tor?

    Tor is a rather complicated device to install and configure. And in not so ancient times, connecting an ordinary “kettle” to it became a far from trivial task. However, today everything is much simpler. Smart and kind people took all the necessary modules, collected them into a coordinated group, configured everything as needed and stuffed it into a single package. This package is called . And after downloading, all the fuss with it comes down to the usual unpacking and subsequent stomping on the “I want Tor!” button. And Tor appears.

    Of course, computer geeks and those who have nothing better to do or want to amuse their PSI, as before, can download all the necessary modules separately and gnaw at the multi-page technical “Kama Sutra”, trying to tie it all into a single whole, and somehow set it up and run the resulting design. Let's wish them good luck, and let's move on to something more rewarding.

    I advise you to pay attention to the link on this tab “ Checking Tor Internet Settings" Clicking on it will help you finally make sure that you are actually now on an anonymous network. By the way, there is also a link to a short guide.

    So, you are now invisible. However, before your head completely spins from anonymity and imaginary impunity, I will hasten to slightly spoil your mood. Just like that, purely out of personal harm.

    I just have to tell you about some " pitfalls» Tor network, so that in search of adventures in your “lower hemispheres” you will not hurt them on these stones.

    A little security in Tor

    So, what Tor cannot protect against. Tor will not be able to protect a person from his own stupidity. If a person has only sawdust instead of brains in his neck growth, or he is purposefully looking for problems for himself, then he will definitely find these problems. And no Tor will help here. Learn to use your brain and exercise basic caution. Tor will also not be able to protect you from chatty programs on your computer. Any plugin or add-on in the browser can instantly “multiply your entire anonymity by zero.” And the browser itself...

    That is why the package we are considering uses a specially modified version of Ognelis. By the way, does anyone else need to be reminded that Windows itself is one huge Trojan and spyware? ( Linux people can breathe freely here - they never worry about such childhood problems of “windows”). Tor will also not be able to protect you from viruses and hackers. Well, it's not designed for that! Get yourself one normal antivirus and firewall, configure them correctly and learn to use them - and sleep well.

    The main problems of the anonymous Tor network

    Okay, I’m finishing my lyrical digression and moving directly to the problems of the Tor network itself. The first thing that catches your eye is the speed. Page loading speed. Although the words “speed” and “rushing” are clearly inappropriate here. Pages are loading much slower than usual. This is the price for anonymity. The page you requested before it reaches your browser, for a long time hanging out between servers around the world. It should, however, be recognized that the situation now is much better than a couple of years ago, and it’s quite possible to live at this rate. If you get used to it a little. No matter what, the network is developing and growing stronger.

    Intelligence services

    Another - and perhaps the main - problem of the Tor network is intelligence agencies. They just can’t come to terms with the fact that crowds of users roam the Internet freely and uncontrollably without their “all-seeing eye.” And they are constantly making all kinds of attempts to change the situation. The attempts are varied, even downright criminal. Before virus attacks, hacker attacks and hacking, targeted infection of software and servers with Trojans. Although not often, sometimes their efforts end successfully for them, and entire segments fall out of the “onion” network, and a “pative van” comes to one of the unluckiest (or the stupidest, or the most arrogant). But you’re not going to do anything criminal in Tor, are you? This is all to ensure that you do not relax too openly and always remember that Tor is not a panacea, and any anonymity is relative. And if you’ve already decided to gamble with the state, then it’s only a matter of time before you’re caught.

    Officials

    In addition to intelligence agencies representing the interests of states, government officials often pose a problem for the anonymous Tor network. The desire to “keep and not let go” in people who have seized power is ineradicable. Occasionally, in relation to some things, this desire is completely justified and fair, but more often than not, it is not. And the bit of freedom granted by Tor acts like a red rag on them. The Tor network is already banned in some countries. Legislatively. There was such an attempt in Russia. So far only in the draft version. Whether and when this project will become law, I do not know. At the moment, the Tor network in Russia operates without restrictions. If they ban it, something else will be found instead. I won’t lay out here verbatim folk wisdom on this matter, but I’ll say it a little softer and more streamlined: “For every action there is a reaction.”

    Hackers

    Another scourge for Tor is hackers. Some of them are ideological. and some are simply stoned to *** (sorry for the unparliamentary expression). Periodically, most often during a spring or autumn exacerbation, they organize “crusades”, trying to “cleanse the world of filth.” At the same time, the opinion of the world itself does not bother them at all. They feel that they have the right to decide for everyone. Not long ago there was a “campaign” against, let’s say, unconventional porn on the Tor network. The point is in this case quite godly. However, along with porn, a bunch of completely white sites were also cut down. Just like that, in passing. And who said that next time they will limit themselves to only this? So know that if your favorite “onion” site suddenly stopped opening, then it is quite possible that these are the actions of one of these with sore brains.

    Infected files

    Hackers are closely related to the problem with infected files of the Tor Browser. And here the ears of various intelligence agencies are often peeking out, trying to plant their Trojan on you instead of an anonymous network. For example, in App Store they still offer to download the infected Tor Browser. Moreover, the App Store administration was notified about this several times back in the fall. However, the Trojan is still there. Strange situation and strange slowness. True, all the strangeness instantly disappears when you remember that the tender and reverent friendship between Apple Corporation and the US NSA is growing stronger day by day. So download the files of Tor itself exclusively from the official website, or our engine, in fact, will also give you the file directly from the official website.

    Minor disadvantages of Tor

    The review of more or less serious problems of the Tor network is over. Let's move on to minor troubles. I have already spoken about periodically disappearing sites. Now about Russian sites in this anonymous network. There are few of them. But they already exist, and there are more and more of them. And even on many foreign-speaking forums there are sections for Russians. So where to wander and who to talk to you will find. However, the main language on the Tor network is still English, and everything delicious on this network is in bourgeois. Although all kinds of dictionaries and dictionaries are always at your service.

    Next. It should be remembered that the Tor network is fundamentally not moderated or controlled by anyone. Sometimes some kind of control is found on individual sites when their owners set rules for their visitors. But no more. Therefore, you may well stumble upon things that shock you. Be prepared for this. Also in this network there are various scumbags, outright schizoids, maniacs and other freaks. There are plenty of them on the “big” Internet, but on the anonymous network they feel more comfortable and are not particularly embarrassed. Their percentage is much smaller than government officials are trying to tell us, but they exist. And if you have minor children, I recommend protecting them from Tor.

    And in general, I urgently demand that the Internet be protected from children! This will only benefit the Internet. This will make him much safer.

    Well, in general, I told all the horror stories. Let me just remind you about viruses that Tor will not protect you from - protect yourself. Well, about anonymity once again - it is never one hundred percent, use your gray matter more often.

    And for dessert, a small list of “onion” sites, so to speak, for overclocking.

    Goodies and bonuses - a small list of “onion” sites

    By the way, if you haven’t realized yet, in Tor Browser you can open both regular sites of the “big” Internet, bypassing some inconveniences, and special sites of the anonymous “onion” network. These sites are located in a special pseudo-domain zone .onion(look carefully at the address). They do not open from the regular Internet. At all. Only from a running and connected Tor Browser.

    • Tor Wiki(http://torwikignoueupfm.onion/) - Directory of Tor links.
    • The Hidden Wiki(http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page) is the first site where every new user of the Tor network should look. Contains links to almost all resources of the “onion” network. Often inaccessible due to huge influx of visitors.
    • The Uncensored Hidden Wiki(http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page) - mirror of The Hidden Wiki. Moderation is minimal.
    • TORDIR(http://dppmfxaacucguzpc.onion/) - a large catalog of “onion” sites.
    • Tor Search(http://kbhpodhnfxl3clb4.onion/), Torgle(http://zw3crggtadila2sg.onion/torgle), TORCH(http://xmh57jrzrnw6insl.onion/) and The Abyss (http://nstmo7lvh4l32epo.onion/) - search engines on the Tor network, at least one of them works.
    • Flibusta(http://flibustahezeous3.onion/) - a mirror of the famous library in the “onion” network (RU language).
    • OnionNet(http://onionnetrtpkrc4f.onion/) - IRC network. The main language of communication is English. Different channels for discussion, even illegal. Additional servers: ftwircdwyhghzw4i.onion, renko743grixe7ob.onion, nissehqau52b5kuo.onion.
    • vTOR“e(http://da36c4h6gxbckn32.onion/) - social network. interest clubs, blogs, forum.
    • RAMP(http://ramp2bombkadwvgz.onion/) is today's largest trading platform in the Russian-language segment of the Tor network. Recently, there have been a lot of complaints about the actions of the administration and the increasing number of cases of scammers. (So ​​don't click your beak and keep your eyes and ears open) Moreover, the largest selection in the entire network. And the highest prices.
    • RUForum(http://ruforumqewhlrqvi.onion/) - Russian-language forum with communication and sale of everything that is not allowed. Recently it has been closed to outsiders. Registration is paid - $10.
    • Amberroad(http://amberoadychffmyw.onion/) is one of the largest shadow trading platforms.
    • Assassination Market(http://assmkedzgorodn7o.onion/) - betting on guessing the date of death of all sorts of bad people. Anyone can add a person to the list or increase the bid on existing positions. At the moment, Barack Obama and Ben Bernanke are in the lead.
    • Hack IT(http://tuwrg72tjmay47uv.onion/) - a live service for hiring hackers.
    • WikiLeaks(http://zbnnr7qzaxlk5tms.onion/) - I hope there is no need to explain what it is? Mirror in the “onion” network (ENG).
    • Onion-Portal(http://ximqy45aat273ha5.onion/) - guide to the “onion” network (RU).
    • http://k4bmdpobhqdguh2y.onion/ - blog about new hidden services networks (ENG).
    • Lukochan(http://562tqunvqdece76h.onion/Lukochan/) - large board (ENG, RU).
    • Silk Road(http://silkroadvb5piz3r.onion) - another large anonymous trading platform (ENG).
    • Keys open doors(http://wdnqg3ehh3hvalpe.onion/) - site about hacking game consoles and all kinds of gadgets (ENG).
    • http://n2wrix623bp7vvdc.onion/hackingservices.html - a resource about hacking social networks, etc. (ENG).

    I intentionally do not cite all kinds of political-revolutionary-partisan resources here. Whoever needs it will find it himself.

    Tor Browser is a free browser with a system for anonymous Internet surfing through a data distribution network protected from unwanted eyes.

    Download the Tor browser in Russian and get free opportunity hide your presence on the Internet; it is also possible to visit blocked sites and receive hidden content from copyright holders on torrent sites.

    The essence of Tor Browser is that it is impossible to track the location of the computer you are using by any third-party objects, since the network connection of the client device is repeatedly encrypted through a chain of “onion routers”.

    People, in an effort to achieve complete anonymity on the Internet, usually use proxy servers. There are a lot of nuances in using this method of web surfing, because there are no guarantees that publicly available proxies are truly safe. To tell the truth, the speed with such a connection usually leaves much to be desired, and the servers themselves do not work consistently for long. A more reliable solution in such a case is to use a special software product Tor Browser, which is also distributed in Russian.

    Tor Browser free download Russian version is recommended for users who want to hide their presence on the Internet. After all, the browser does not leave any traces on the network.

    It is worth recalling that the Turbo function in the free Yandex browser for Windows also allows you to bypass most blocked sites.

    The free Tor browser will allow you not only to hide your presence on the Internet, but also, in the era of the fight against digital piracy, to open blocked sites and download the necessary information from them.

    To productively use the free Tor browser in Russian, you need to have a clear idea of ​​its resources, capabilities, advantages and disadvantages, since it is not an invisibility cap and not wand, but an in-depth tool with its own specific coverage.


    You can download the Tor browser for Windows 10, 8 and 7 absolutely free and in Russian using the link below from the official website.

    So how does the Tor Browser Bundle work? After connecting the service to the Onion network, a chain of servers is formed through which data flows during the session, and the resulting path path is unknown to any of the routers.

    In the meantime, all transmitted information is encrypted, and their own keys are established between individual nodes. Periodically, the overall system changes data transmission circuits.

    Therefore, the application is a centralized means of ensuring the confidentiality of user channels, making it possible to make it as difficult as possible to recognize data transmission routes.

    You need to know that the Tor browser cannot solve all the problems of establishing complete security. It is aimed only at protecting information precisely at the stage of direct transmission. This is not an antivirus, not a firewall, i.e. If, when downloading, the user receives some kind of “Trojan” in addition to the required file, then there is nothing to blame the application for.

    Installing Thor is very easy, you don’t even have administrator rights. You just need to use the installer file, which will independently launch the local proxy server and add the corresponding plugin to the browser.

    Using the application will absolutely eliminate the possibility of identifying the user’s physical location, as well as intercepting the information transmitted by him.

    You can download the Tor browser for free from the official website in Russian using the links below for Windows 7, 8 and 10.

    Name: Tor Browser Bundle
    Release year: 2019
    Version: 8.0.6 Final
    Platform: RS
    Developer: The Tor Project
    Interface language: Russian
    Medicine: not required

    System Requirements:


    • Windows 7 / 8 / 8.1 / 10 (32/64-bit)

    Description:
    Tor Browser Bundle will make it impossible to monitor your Internet connection and collect information about which sites you visit. Also, any information about your physical location will be hidden from all sites. This Bundle consists of Tor software, as well as an appropriately configured Firefox browser. The package does not require installation and can be launched from any storage medium.

    The Tor Project on its Facebook announced several ways to install its browser if the project’s website is blocked by the authorities of the country where you currently live:
    “We are committed to fighting censorship, and if you want to download our browser to bypass it, but our site is blocked [in your country], we have alternatives for you.”

    The first way is to download the Tor Browser & Orbot applications from the Github repository.
    The second way is to send a request to GetTor via e-mail, XMPP or Twitter.
    It's easy to use:
    Step 1. Send a request to GetTor, indicating your operating system(and maybe your language).
    Step 2: GetTor will send you a response with links to download Tor Browser from services supporting the project.
    Step 3: Download Tor Browser from one of the providers. When finished, check the integrity of the downloaded files.
    Step 4: Get multiple bridges if necessary!
    Currently Tor uses the following services: Github, Dropbox, Google Drive.

    Let us remind you that the Tor project team recently presented a release on its blog new version your browser Tor Browser, or rather its first stable version in the 7.0 series. In the new version, TorBrowser switched to using Firefox 52 ESR and contains a number of progressive changes.

    If you want to install Tor as a service on Windows, then you need the Expert Bundle. It can be downloaded from the same page of the official website.
    From the downloaded archive tor-winXX-0.3.X.X.zip) unpack the Tor folder to the root of drive C.
    To install the service, just run the command:

    C:Tortor.exe --service install

    You can install the service using various Tor command line options.

    We will need a configuration file, so create one in the C:Tor directory, this file should be named torrc:

    Echo(>C:Tortorrc

    You can check whether the service starts with the settings file (if it contains errors) with the following command:

    C:Tortor.exe -f "C:Tortorrc"

    Now let's install the Tor service, which will read the settings from the C:Tortorrc file:

    C:Tortor.exe --service install -options -f "C:Tortorrc"

    Remember that options can be specified after the -options flag, otherwise they will be ignored.

    To start and stop the service use the commands:

    C:Tortor.exe --service start
    C:Tortor.exe --service stop

    To remove a service:
    C:Tortor.exe --service stop
    C:Tortor.exe --service remove

    Please note that you must first stop the service and then remove it.

    By default, the Tor service listens on port 9050, so you can check if it is running with a command that shows whether port 9050 is listening:

    Netstat -aon | findstr ":9050"

    Update Firefox to 60.5.0esr
    Update Tor to 0.3.5.7
    Update Torbutton to 2.0.10
    Bug 29035: Clean up our donation campaign and add newsletter sign-up link
    Bug 27175: Add pref to allow users to persist custom no settings
    Update HTTPS Everywhere to 2019.1.7
    Update No to 10.2.1
    Bug 28873: Cascading of permissions is broken
    Bug 28720: Some videos are blocked outright on higher security levels
    Bug 26540: Enabling pdfjs disableRange option prevents pdfs from loading
    Bug 28740: Adapt Windows navigator.platform value on 64-bit systems
    Bug 28695: Set default security.pki.name_matching_mode to enforce (3)

    You need to change some of your habits, as some things won't work exactly as you are used to. Please read the for details.

    Microsoft Windows

    Expert Bundle

    Windows 10, 8, 7, Vista, XP, 2000, 2003 Server, ME, and Windows 98SE

    Contains just Tor and nothing else. You"ll need to configure Tor and all of your applications manually. This installer must be run as Administrator.

    Apple OS X

    Linux

    Android

    The current unstable/alpha version of Tor is 0.4.0.2-alpha. It's available.

  • Don"t open documents downloaded through Tor while online

    Tor Browser will warn you before automatically opening documents that are handled by external applications. DO NOT IGNORE THIS WARNING. You should be very careful when downloading documents via Tor (especially DOC and PDF files, unless you use the PDF viewer that"s built into Tor Browser) as these documents can contain Internet resources that will be downloaded outside of Tor by the application that opens them. This will reveal your non-Tor IP address. If you must work with DOC and/or PDF files, we strongly recommend either using a disconnected computer, downloading the free VirtualBox and using it with a virtual machine image with networking disabled, or using Tails . Under no circumstances is it safe to use together, however.

  • Use bridges and/or find company

    Tor tries to prevent attackers from learning what destination websites you connect to. However, by default, it does not prevent anyone watching your Internet traffic from learning that you"re using Tor. If this matters to you, you can reduce this risk by configuring Tor to use a Tor bridge relay rather than connecting directly to the public Tor network. Ultimately the best protection is a social approach: the more Tor users there are near you and the more diverse their interests, the less dangerous it will be that you are one of them. Convince other people to use Tor, too!

  • Be smart and learn more. Understand what Tor does and does not offer. This list of pitfalls isn't complete, and we need your help

    Today, the variety of alternative software will no longer surprise any user. In addition to the undisputed leaders, promising and simply interesting projects appear. Thus, due to increased attention to maintaining the anonymity and security of confidential information on the Internet, the Tor browser has become quite widespread.

    Browser rating

    In line popular browsers has confidently occupied a leading position for several years in a row Google Chrome. According to various sources, the product from the information giant Google is installed on the computers of 46 to 55% of Runet users. The browser satisfies the basic needs of the average user: Chrome is fast and stable, not overloaded with frills, and is equipped with SandBox technology, which guarantees protection against viruses and hacking.

    Yandex.Browser can also be considered among the leaders, Mozilla Firefox, Internet Explorer- a standard solution offered by Microsoft Windows Corporation, Opera. Orbitum is gaining popularity, which is actually no different from Chrome, but has a number of advantages:

    • improved page loading speed and confidential information protection system;
    • added the ability to communicate on social networks through a special quick chat window;
    • accounts of popular social networks are displayed in a separate list.

    Alternatives and promising projects

    Recently, the greatest response from users has been generated by programs that allow you to maintain privacy on the Internet and open blocked sites. Such solutions include Globus and Tor Browser. By the way, the latest Internet Explorer is currently the dominant browser that uses onion routing technology - a technique for anonymously exchanging information through a computer network.

    Browser download page

    The Tor browser, reviews of which are built mainly around the ability to act incognito on the World Wide Web, can be downloaded from the official website of the developers in Russian - a mirror of the English-language resource TorProject. The page, designed in purple tones, promises the user “confidentiality of communications and security on the Internet.” The latter is achieved through the use of an extensive network of servers, which is formed by volunteers from all over the world.

    On the page you can also see a request for financial support for onion routing. The funds are expected to be spent on further development project in Russia and the countries of the Commonwealth of Independent States, as well as ensuring adequate protection from the control of relevant services.

    Onion routing

    Onion routing, the technology on which Tor Browser is based, is a method for anonymously exchanging information on the Internet. Messages are repeatedly encrypted and sent through several routers, each of which replaces one layer of encryption with its own. Thus, intermediate points of information transfer have no information about the content or purpose of the message, nor about the point of sending, nor about the point of reception.

    The main idea of ​​onion routing is to ensure the maximum level of anonymity for users - the sender and recipient of information, as well as protecting the contents of the message from strangers. Of course, onion routing technology does not guarantee secrecy, but it makes it much more difficult for eavesdroppers to find out the data.

    History of the application

    The Tor browser, whose reviews are mostly positive, is free software created to implement the second generation of onion routing. The system was developed in laboratories of the US Navy under federal orders from the authorities. After some time, a large human rights organization announced its support for the project. Additional funding is provided by the United States Department of Defense, the National Science Foundation and the State Department.

    The software source code is published in open access, so that everyone has the opportunity to make sure that there are no errors, bookmarks or other elements that secretly collect information about users. At the moment, the number of participants in the router network is estimated at two million, and servers are scattered all over the world. Unless there are no network nodes in Antarctica.

    Installing the application

    The archive is downloaded from the official Tor website on RuNet quite quickly. In the window that opens after the download is complete, you must select the language, installation folder and wait for the files to be copied. "Tor" (browser in Russian) installs quickly: in general, the installation process takes no more than two minutes. At the same time, Adguard, a program for blocking advertising (pop-up windows, banners and videos) - on the strong recommendation of the developers, installed along with the browser to ensure the correct operation of the latter, offered to briefly familiarize itself with the capabilities and also install the mobile application.

    Browser interface

    Externally, the program window is very similar to Google Chrome. The Tor browser, reviews of which note its similarity to the Internet explorer of the computer giant Google, already on the start page suggests “leave the browser window at its original size,” since opening it at full size will allow web resources to determine the size of the user’s screen. After consent, by the way, the browser simply does not open in full screen.

    The Tor Browser menu is exactly the same as Chrome. Not even changed appearance icons Search engine own programs - Look. By the way, the main page of the resource was not found at the request of “Wikipedia”.

    However, Tor (browser) for Windows is designed for viewing resources that are hidden on the “regular” Internet. So “drug forum” or “synthesis of coke analogues” is not the most unusual thing that one would expect.

    Information transmission chains

    The Tor browser, reviews of which, despite some discrepancy between the search results and the query, are still positive, for each site presents a chain reflecting a list of information transfer points. Yes, for home page"Wikipedia" appears like this:

    1. This browser.
    2. Czech Republic.
    3. Netherlands.
    4. Netherlands (different IP address shown in brackets).
    5. Internet.

    When moving to another page, the chain changed dramatically. For the mail.ru portal, the intermediate points for transmitting information were:

    1. This browser.
    2. Czech Republic.
    3. France.
    4. Germany.
    5. Internet.

    Using the Browser

    To obtain hidden information or ensure confidentiality personal life Tor (browser) is used. How can an ordinary user use the software? Of course, it’s easier to surf the web on publicly available resources in more familiar versions of Internet Explorer, but communicate in social networks and transmit confidential information in some cases it makes sense to use onion routing.

    Thus, Edward Snowden transmitted information to journalists through Tor (browser). “How to use the software?” — Italian activists, who created a website with information about the activities of the local mafia, did not ask this question either. Many public organizations and civic leaders recommend Tor both to ensure their own security and, in general, to preserve freedom on the Internet.

    Browser versions

    In addition to the desktop version, there is Tor (browser) for Android in two variations. However, the application is called differently - Orbot or Orfox. The latter program is based on Firefox, not Chrome. "Tor" (browser) for Android (both versions) can be freely downloaded from Google Play.

    There are also alternative builds of Tor from other developers. For example, Dooble-TorBrowser significantly expands the possibilities of work, and PirateBrowser, according to programmers, is only suitable for viewing websites subject to censorship, but does not provide anonymity on the Internet. "Tor" is a browser, the versions of which are distinguished by their diversity due to the open source code programs. It is the official version from The Tor Project, Inc.

    Criticism and protests against the Tor browser

    The widespread use of the software has caused some public protests. The possibility of using the browser for criminal purposes is most often mentioned; computer terrorism, replication of unlicensed software, illegal drug trafficking, running Trojan horses and similar illegal activities are also common accusations. There are dozens of precedents for the Tor browser, but the software continues to be widely used.