/>
X

The 10 step guide to using Tor to protect your privacy

Here are 10 easy steps to show you how to use the Tor network to mask your browsing habits.
tor-network-zdnet-guide.jpg
1 of 10 Charlie Osborne/ZDNet

What is Tor?

Tor stands for The Onion Router project.

The Onion Router (TOR) is a non-profit setup which runs a network designed to improve personal privacy and increase anonymity online by masking Internet traffic, as well as preventing online domains from gathering information about you and your browsing habits.

tor-network-zdnet-guide-3.jpg
2 of 10 Charlie Osborne/ZDNet

What is Tor used for?

Tor is used by people who are privacy-conscious -- especially after Edward Snowden's disclosures about the NSA, In addition, the network is used by journalists, people avoiding censorship, businesses and traders in underground markets. You can only access the underbelly of the Internet, known as the "Deep Web" and .onion web addresses -- which are not indexed by standard search engines -- through Tor.

screen-shot-2016-07-21-at-12-22-28.jpg
3 of 10 Charlie Osborne/ZDNet

How does it work?

Tor uses relays and nodes ran by volunteers to disguise your traffic and the true origin of your IP address, a de facto network of tunnels rather than a direct line to websites you visit. Instead of sending packets of data directly to a server, this information is bounced to different relay points. By doing so, the network helps you disguise your digital footprint and keep out spying eyes.

zdnet-tor-network-guide-5.jpg
4 of 10 Charlie Osborne/ZDNet

Does Tor encrypt my data and traffic?

The answer is no. Tor is only a traffic anonymizer and does not encrypt your traffic, but the use of virtual private networks (VPNs) in addition to Tor and staying away from HTTP-based websites will help. Use HTTPS whenever possible.

screen-shot-2016-07-21-at-12-23-23.jpg
5 of 10 Charlie Osborne/ZDNet

Do I have to pay?

Tor is free and open-source with a number of developers working on the network, which is compatible with Windows, Mac, Linux/Unix, and Android.

tor-network-zdnet-guide-2.jpg
6 of 10 Charlie Osborne/ZDNet

How do I use Tor?

You simply download the browser for PCs and Orbot for Android devices. The software is already configured for you, but as the network relays traffic indirectly, it is unlikely you will reach the same speed levels as before.

screen-shot-2016-07-21-at-12-22-47.jpg
7 of 10 Charlie Osborne/ZDNet

How do I access .onion addresses?

The "clear web" is the layer of the Internet which is indexed by search engines including Google. Underneath, you have the "deep web" and "dark web," the latter of which is associated with illegal operations.

Onion addresses are part of the "deep web," and to access them, you need to know the 16-character code instead of a standard URL. You can find these through deep web search engines, forums and through invitations -- and some companies, such as Facebook, have issued .onion addresses for Tor users.

screen-shot-2016-07-21-at-12-23-07.jpg
8 of 10 Charlie Osborne/ZDNet

How can I stay safe?

If you're going to use Tor, you need to understand some of the basics of Internet security. As a standard tip, disable plugins and software which could leave you open to exploit, such as Flash and Java.

You should keep in mind that Tor does not prevent you from operating system security vulnerabilities -- and considering how many flaws are found in software on Windows, you may want to use a different OS to stay as protected as possible.

zdnet-tor-network-guide-4.jpg
9 of 10 Shutterstock

Anonymity isn't fool proof

There are still ways that police agents can scrutinize your activity, so do not consider yourself 100 percent protected just because you are using Tor. If you visit illegal domains, buy or sell illegal goods or download explicit, banned material, Tor may not protect you.

zdnet-tor-network-guide-6.jpg
10 of 10 Wikimedia Commons

So, should I use Tor?

If you want to help anonymize your traffic, do so -- but for tasks which need a high Internet speed such as torrenting, this is not the right solution. In addition, if you want to use the network for illegal activity, this is at your own risk.

Do not consider Tor as the ultimate solution to security -- it is, instead, one aspect. VPNs and sticking to HTTPS are also important components to protecting yourself and your data.

Related Galleries

Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza
img-8825

Related Galleries

Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza

26 Photos
A weekend with Google's Chrome OS Flex
img-9792-2

Related Galleries

A weekend with Google's Chrome OS Flex

22 Photos
Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup
shutterstock-1024665187.jpg

Related Galleries

Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup

8 Photos
Inside a fake $20 '16TB external M.2 SSD'
Full of promises!

Related Galleries

Inside a fake $20 '16TB external M.2 SSD'

8 Photos
Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup
Asian woman working at a desk in front of a computer and calculator

Related Galleries

Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup

8 Photos
Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup
Person seated at a booth in a cafe looks at their phone and laptop.

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup

10 Photos
Drive Electric Day: A dizzying array of EVs in sunny Florida
ca3b4019-26c5-4ce0-a844-5aac39e2c34b.jpg

Related Galleries

Drive Electric Day: A dizzying array of EVs in sunny Florida

16 Photos