Surf anonymously with the Tor Browser. Here's how to install Tor on a Linux desktop. Beware of Ubuntu users: The Tor project recommends that you do not install Tor through the regular Ubuntu software repositories.
What is Tor?
In the occasional language, the terms "Internet" and "Web" are used interchangeably. In fact, the Web and the Internet are two very different things. If sites were premises ̵
The Internet supports many services. The World Wide Web is just one of them. Other services, such as e-mail, RDP, DNS, and NNTP, are provided over the Internet, and none of them is a Web site.
Overlay networks also use the Internet. The Tor network (The Onion Router) is one such overlay network. It offers users anonymity and privacy. If you use Tor effectively, nobody can trace your activity back to your IP address.
The traffic transmitted over the Tor network is encrypted. While this helps preserve the anonymity of users, encryption causes a network problem. The regular routing and switching elements of the Internet can not work with Tor network traffic.
A network of Tor Relays hosted and maintained by volunteers performs switching and routing instead. The gate relays intentionally bounce your connection between multiple relays, even if that routing is not required to reach your destination. This "hopping" is another reason why Tor makes it virtually impossible to trace and identify the person at the other end.
It is the strength of this anonymity that has led to the Tor network being used to host many websites engaging in criminal activity. The Tor network forms a large part of the dark network. However, not all illegal activities are in the Tor network. Dissidents in repressive regimes, anonymous press sources, whistleblowers, activists and the military use Tor for legitimate reasons.
The problem is, exactly what makes it an attractive proposition for these people also makes it an attractive proposition for the bad guys.
Tor's hidden services have addresses ending with the suffix ".onion". They are not displayed on Google and can not be viewed or viewed using a standard internet browser. You must use the Tor Browser to visit these websites. However, you can also use it to access normal websites with additional anonymity.
RELATED: Accessing .onion sites (also known as Tor Hidden Services)
Installing the Tor Browser
Note that the Tor project does not support the installation of pre-built versions of the Discourages Tor browsers from the Ubuntu repositories since they have not been reliably updated by the Ubuntu community in the past. Only install it from the official Tor Project website. The Tor Project also provides official repositories for Ubuntu and Debian, but the following manual instructions work on every Linux distribution.
Navigate to the download page of the Tor Project and click on the penguin.
If your browser offers to open or save the file, select the Save File option.
Suppose the file is saved in the download directory.
When future versions of the Tor browser are released, the version numbers in the file name change. Part of the file name also indicates the language. In this example, "en-US" means English (USA).
If you downloaded a different language version or follow these instructions at a later time when the browser version changed, replace the file with the names and directory names that you actually use for the file names and directory names used in this guide.
The downloaded file is a .tar.xz file. We need to decompress and decompress it so we can use its content.
RELATED: Extracting Files from a .tar.gz or .tar.bz2 File on Linux
There are several ways to do this. If you right-click on the file, a context menu appears. Choose Extract Here from the menu.
If your shortcut menu does not include the Extract Here option, close it and double-click the downloaded file. Your file manager may extract the file content for you.
If this does not work, open a terminal window in your Downloads directory and use the following command. Note that the "J" in
xvJf is in capital letters.
tar -xvJf tor-browser-linux64-8.5.1_en-US.tar.xz
 Either way, the file is decompressed and unpacked for you. A new directory will be created in the Downloads folder.
Double-click the new directory to have the file manager change to this directory. As with Russian dolls, there is another directory in the first.
Run from the directory or do a system installation?
Here is your choice.
Now After you download and extract the Tor Browser, you can use it without further installation steps. You can also perform tighter integration with a system-level installation.
The functionality of the Tor browser is the same in both cases, and security updates and fixes will find and update the browser in both cases.
You Maybe it's better if the Tor Browser is as light as possible on your computer. If you feel happier without having the Tor Browser embedded in your system, that's fine. They are just as anonymous and protected if you use them directly from this directory as you use them after a system-level installation. If this is your preferred approach, follow the instructions in Using the Tor Browser in the Tor Directory.
If you want the Tor Browser to be recognized by your desktop environment as an installed application and to be displayed in the Application Menus and Application Finder, follow the instructions in the System-Level Integration section.
Using the Tor Browser from the Tor Directory
To launch the Tor Browser directly from the directory, open a terminal window at this point and enter the following command:
./ tor -browser_en-US / Browser / start-tor-browser &
You can now continue with the Configuring the Tor Browser section in this article.
System level integration
Open a terminal window here. To install the Tor Browser in a system folder, you must move the
tor-browser_en-US directory to
/ opt . This is the usual location for user-installed programs on Linux. We can do this with the following command. Note that you must use
sudo and be prompted to enter your password.
sudo mv tor-browser_en-US / opt
The folder is moved to the new location and disappears from the file manager window. Change the directory in the terminal window so that you are in the directory
/ opt / tor-browser_en-US .
cd / opt / tor-browser_en-US
If you use
ls to list the contents of this directory , a different directory and a file with the extension ".desktop" will be displayed. We need to run the .desktop file to register the application in your desktop environment.
./ start-tor-browser.desktop --register-app
Starting the Tor Browser
The installation sequence described above has been tested on the latest Ubuntu, Fedora and Manjaro Linux distributions. If you press the Super key (the key between the left Ctrl and Alt key) and enter "tor", the Tor Browser icon is displayed in all cases.
Click on the icon to start the Tor Browser.
How to Configure the Tor Browser.
The first time the Tor Browser starts, a dialog box appears.
If you are accessing the Internet through a proxy or are in a country If you are trying to censor the use of tools such as Tor, click the Configure button.
If none of these options apply to you, click the Connect button.
When you click the Configure button, you can set a proxy or configure a bridge so that you can use Tor in countries where use is restricted.
 We will first look at censorship options.
Select "Tor is censored in My Land". Three options are displayed.
These options allow you to configure a bridge in different ways. Bridges are alternative entry points into the Tor network. They are not listed publicly. Using a bridge makes it difficult for your Internet service provider to detect that you are using Tor.
The first option allows you to select an integrated bridge. Click the Select Integrated Bridge radio button and select one of the jumpers from the Select Bridge drop-down menu.
The second option is to request an alternate bridge.
Click the "Request a bridge from Torproject.com" radio button and click the "Request a new bridge" button.
When you click the "Request New Bridge" button, you are prompted to fill in a captcha to prove that you are human.
The third option is for you You already have the details of a bridge that you trust and that you used previously, and you want to reuse that bridge.
Click the "Provide a bridge I know" radio button and enter the details of the bridge you want to use.
If you have configured your bridge with one of them In these options, click the Connect button to launch the Tor Browser.
How to Configure a Proxy
If you are connecting to the Internet through a proxy, you must provide proxy details to the Tor Browser.
Click the "I'm using a proxy to connect to the Internet" radio button. A new set of options is displayed.
If you have set up your own proxy, you know the connection details for it. If you're on a corporate network or someone else has set up the proxy, you'll need to get the connection details from that person.
You must specify the IP address or network name of the device acting as a proxy, and which port should I use? If the proxy requires authentication, you must also enter a user name and password.
Click the Select Proxy Type button to select the proxy type from the drop-down menu, and then fill in the other fields.
When you have configured your proxy, click the Connect button to start the Tor Browser.
How to Use The Tor Browser
A progress bar is displayed while connecting to the Tor network.
Soon the main window of the Tor Browser will be displayed. 
If it looks very similar to Firefox, it's Firefox optimized and configured to work on the Tor network.
But be careful. Just because you're familiar with Firefox, do not adjust any configuration settings. And do not install add-ons. Both affect the Tor Browser's ability to mask your identity. And if you do this, it makes little sense to use the Tor Browser.
You can enter any Web site address in the address bar, and the Tor Browser will easily navigate to this Web site. However, using the Tor browser for general Internet browsing results in a worse user experience than a standard browser.
Your connection over the network is transmitted by Tor relays, so your connection is slower. And to preserve your anonymity, certain parts of websites may not work properly. Flash and other technologies – including some fonts – can not be executed or viewed as usual.
The Tor Browser is best reserved for cases where you value anonymity that is beyond the user experience, and in case you need to call a. onion "website.
Accessing an Onion Site on Linux
Some Web sites are present in the clear Web and Tor network. The search engine Duck Duck Go does that, for example. With the Tor Browser, you can quickly connect to the Duck Duck Go site ".onion".
Click the link "New to Tor Browser?" In the upper left corner of the browser window.
Click on the "Onion Services" link and then on the "Visit an Onion" button.
You are brought to Duck Duck Go-Site ending with ".onion".
Click on the logo with the green onion in the information field of the site to display the route to which your connection was made. The ".onion" – Site you are currently viewing.
The route that has taken your connection is called a "circuit". In this example, the route starts in the UK and travels through France to the US and then another set of unnamed relays, before finally arriving on the Duck Duck Go ".onion" website.
Click the shield icon in the upper right corner of the browser toolbar to see the current security level.
If you want to change the security level, click the Advanced Security Settings button.
You can set the security level to Standard, Safe, or Safe. Any increase in security reduces the number of site features that continue to function properly.
You can browse the web and find lists of other ".onion" sites. but that is a dangerous practice. Many of these host material that is considered illegal and let your eyes or both bleach. Onion "in the Tor network. You can then use these websites with anonymity.
Honest and legal Web sites that value privacy and security and make them a key part of their customer offer are likely to provide a ".onion" site for them to be reached with the Tor browser
For example, ProtonMail was allegedly owned by Reason for safety and privacy. They have a ".onion" site where their users can connect to them with more privacy. Of course, this link does not work in a normal browser window.
And even more anonymity
If even the Tor browser does not provide enough anonymity and privacy for you, another project that's at the heart of Tor could do that what you need.
Tails is a live operating system that you can run from a USB flash drive, SD card or even a DVD. You can carry it with you and use it from (almost) any computer. You do not have to install anything, and you leave no digital traces.
Be careful, be careful, careful and secure.
If you want to get off the road web and in the shadows you must always think before you click.