How to properly set up Tor

How to properly set up Tor

Tor is an indispensable tool for those who are concerned about privacy when surfing the web. Many believe that to be completely anonymous, simply download the Tor browser package from the Internet and run it. This is not the case. When surfing the Internet, you should consider that there are some patterns of so-called bad behavior that can reveal your real identity and location even when surfing the Tor. We will try to get to know the Tor network, and develop some mechanisms to interact with it in order to keep our privacy.


So, the Tor network is created by servers run by volunteers. The main purpose of the Tor network is to allow users to hide their identity, as well as to prevent surveillance mechanisms on the Internet. All your communications with the Network are encrypted, requests move from one relay to another, and then finally reach your destination. Combined with https Tor provides end-to-end encryption, making it impossible for even volunteers supporting Tor servers to read your traffic, and your real IP address is well masked with the IP address of the last relay. So what could go wrong with such a sophisticated privacy scheme? Why aren’t these measures enough to keep you completely anonymous?

Where to Start

To start forming correct habits when working with Tor, let us highlight a few main points:

  • Usely use the Tor browser. Although any browser can be connected to Tor, it is recommended that you use the browser of the same name. The reason for this is that the native browser is configured accordingly, while other browsers may leak confidential information due to their settings.
  • Don’t work with torrent files via Tor. It is well known that torrent file sharing applications can ignore proxy server settings by revealing your real IP address. Another reason is that working with torrents through Tor can severely slow down the entire network.
  • .
  • You can use HTTPS everywhere. The Tor browser has a plugin called HTTPS Everywhere, which forces sites that support this protocol to use it. The result is that you can use end-to-end encryption. Visit the developer site of this plugin for more information.
  • Don’t install or activate additional browser plug-ins. The only plugins you need are already included in Tor. Other plug-ins can help to reveal your identity, making use of Tor completely useless.
  • Use Tor bridges. All of the above precautions will not hide the fact that you are using a Tor browser. So the tracking traffic user can flag it. If you are concerned about this problem, we strongly recommend using Tor bridges.

Tor Bridges (Tor bridges)

Tor Bridges are special relaying nodes in the Tor network. They differ from the usual nodes (nodes) involved in the connection chain by having a closed status. That is, they are excluded from publicly available (published) lists. Used to bypass the blocking by the Tog network provider.

If Tor is not running, click “configure” in the main window and skip the proxy phase.


Then press “Yes” on the next screen and select “obfs4” as the default type.

If the browser is running, the following sequence must be followed. Click on the bow icon.

Then select “Tor is censored in my country” (Tor is banned in my country).

Then also select “obfs4”.

After all these actions, it will be difficult for anyone to identify that you are using Tor.

WARNING! All links in the articles may lead to malicious sites or contain viruses. Follow them at your own risk. Those who purposely visit the article know what they are doing. Do not click on everything thoughtlessly.


0 0 vote
Article Rating
Notify of
Inline Feedbacks
View all comments

Do NOT follow this link or you will be banned from the site!
Would love your thoughts, please comment.x

Spelling error report

The following text will be sent to our editors: