How to use the Tor browser

Tor stands for The Onion Routing. Onion routing means that when you connect to the internet, all your internet traffic is routed through multiple servers along with being encrypted at each step. So, the uniqueness of the Tor browser is that it offers privacy and its code is free and open-source.

In this age, when almost the whole world is connected online, there are also the problems of online tracking, censorship, and surveillance which can be real hurdles for those who do not want their identities to be revealed online or want to have censor-free internet access. For them, the Tor browser can act as a savior. Using the Tor browser, one can connect to the internet anonymously. Even if someone tries to monitor the internet traffic of a Tor browser user, they will only be able to see that you are using Tor.

See also: What Is The Best Internet Browser For Mac?

Installing Tor browser

Go to and click on the download option for the operating system on which you want to install Tor. You must use the official link to download Tor otherwise you might end up install some malware on your system in place of Tor. After downloading the setup, its installation is like any other normal software installation. E.g. for Windows OS, just double click on the setup file downloaded and confirm any prompt shown in a dialog box asking whether you want to install this software. Now, just wait for it to finish installing.

The Tor browser is portable software. So, once you have installed it, you can run it from a USB drive too. You just need to select a location (which can be USB drive too) to install during the setup.

First time run of Tor

There are some initial settings that you need to do when you run the Tor browser for the first time.

  1. When you open Tor for the first time, you will see a network settings window. Here, you will see two options: ‘connect’ and ‘configure’. The ‘connect’ option should be clicked if your connection does not use any proxy or if your connection is not censored.
  2. After that, you will be connected to the Tor network after waiting for a while. The wait may be dependent on your internet connection.
  3. However, if your connection uses a proxy or your connection is censored then you need to click on the ‘configure’ option. Next, choose whether ‘Tor is censored in my country’ and/or ‘I use a proxy to connect to the internet’.
  4. Depending on the option(s) that you chose, you will be asked to choose some sub-options too.
  5. If you chose the ‘I use a proxy to connect to the internet’ option, then you will be asked to provide details of the proxy connection.
  6. In case you chose the ‘Tor is censored in my country’ option, then you need to choose how you want a bridge. That is, whether you want to ‘select a built-in bridge’ or ‘request a bridge from’ or ‘provide a bridge I know’.
  7. Then click connect and wait for it to establish a connection to the Tor network.
  8. After it is connected, you are done and can surf the internet anonymously.

Some facts and best practices

  1. The Tor browser is based on a modified version of the Firefox browser.
  2. Tor is available for Android, Windows, Mac OS X and Linux operating systems.
  3. There is no backdoor in Tor. Also, the official Tor website promises that there will never be a backdoor in Tor.
  4. Additional plugins or add-ons installation in the Tor browser is not recommended as they may risk your privacy protection.
  5. You should use https encrypted connection for every website otherwise your internet traffic can be observed by the exit node in the Tor circuit.
  6. Tor browser is useful only for protecting your anonymity on the internet but it cannot completely protect you from computer viruses or malware if you go the darker parts of the web.
  7. You should avoid using torrents on the Tor network because it can reveal your IP address and thus can put your anonymity at risk.