Tor Browser Handbook - Quick Start Guide On How To Access
Tor Browser Handbook - Quick Start Guide On How To Access
Bonus
Introduction
Chapter 1: What is Tor?
Chapter 2: How Do You Use Tor?
Chapter 3: How Does Tor Technically Work?
Chapter 4: Tor Legal FAQ
General Information
Can I be prosecuted or sued for running Tor?
Should Tor be used for illegal purposes?
Can The Tor Project or EFF promise that I won’t get in
trouble for operating a Tor relay?
Will EFF represent me if found legally liable for running a
Tor relay?
Can I contact Tor developers with legal questions or if I
suspect Tor is being used for illicit purposes?
Are there any promises made by Tor developers about the
reliability and trustworthiness of Tor relays within the
directory?
Exit Relays
Should an exit relay be run from my home?
Should my ISP be informed before running an exit relay?
Should I look at the plaintext traffic that exits my end relay?
What should I do if I receive a subpoena or information
request from law enforcement?
What should I do if I receive a DMCA notice from my ISP?
Chapter 5: Overview (What Tor Is and Is Not)
Chapter 6: Tor vs. VPN – The Important Differences
VPNs
Tor
Chapter 7: What is My IP Address and How Do I Hide It?
Hiding Your IP Address
Chapter 8: Getting Started with the Tor Browser Bundle
Chapter 9: Installing Tor – Windows
Chapter 10: Installing Tor – Linux
Chapter 11: How to Access the Deep Web
Chapter 12: Do’s and Don’ts – Safe Browsing with Tor
Chapter 13: Top Tor Links and Resources
Search Engines
General Things to Check Out
Marketplace
Financial Services
Commercial Services
Hosting Services
Filesharing
Image Hosting
Web Hosting
Blogs/Essays/Personal Pages
Forums
Email/Messaging
Hacking
Politics
Weapons
Chapter 14: Hidden Wiki and Tor Directories
Conclusion
Thank You
Bonus
As a Thank You for downloading this book, you can find a Free Tor
Tips & Links bonus report at torbrowserhandbook.com/bonus! It will
provide condensed tips from this guide and clickable links in a handy
pdf so you don’t have to disrupt your reading experience trying to
write down or click links as you go through the book. I really
appreciate your support and hope this book serves you well.
Introduction
Whether you are concerned about Big Brother watching what you
do, hackers stealing your personal information, or if you’re just sick
of advertisers displaying custom retargeting ads based on your
browsing history, Tor is the answer. It is a free, open source tool
designed specifically for people who value their online anonymity
and using the information contained within this guide, you will be well
equipped to carry the shield of privacy and anonymity wherever the
Internet takes you.
In this guide, you will learn the answers to common questions about
Tor such as:
Online freedom comes in the form of anonymity and you now hold
the key to unlocking that freedom for yourself.
Chapter 1: What is Tor?
The Tor Project was originally developed by the United States Naval
Research Laboratory, along with a mathematician Paul Syverson
and computer specialists Michael Reed and David Goldschlag in the
1990’s as a way to protect sensitive intelligence communications. It
was during this time that the core principle behind Tor–onion routing–
was originally developed. This same technique, which protects
users’ anonymity by protecting online activity through a series of
encrypted layers, is how Tor still works today.
With the brief history lesson out of the way…what exactly is Tor? In
its most basic form, The Tor Project is comprised of two parts: a
browser client that allows users to connect to the Tor network and a
global system of relays designed to anonymously bounce traffic from
the Tor browser throughout the world before serving the requested
content. When using a conventional Web browser, most Internet
requests are easily intercepted. It is also easy to figure out where a
particular user is located based on that individual’s Internet Protocol
(IP) address. Using Tor provides a secure way to browse the Internet
without broadcasting the physical IP address of the device or any of
the information being viewed during the session. The system works
so well, in fact, that the National Security Agency (NSA) has been
quoted as saying that Tor is “the king of high security, low latency
Internet anonymity.”
Tor is a service that helps you to protect your anonymity while using
the Internet. Tor is comprised of two parts: software you can
download that allows you to use the Internet anonymously, and the
volunteer network of computers that makes it possible for that
software to work.
Using Tor requires that a user download and install the Tor browser
(freely available from The Tor Project website at
https://torproject.org). Once properly installed and configured, the Tor
browser connects to the Tor network using encryption techniques
that protect the integrity of anything transmitted between the client
machine and the Internet. The Tor browser is actually based on the
popular Mozilla Firefox Web browser. In fact, users of Firefox should
find interacting with the Tor browser client to be quite familiar.
Tor is not designed to erase the tracks left behind after Internet
usage nor is it a 100% fail-safe way to protect one’s identity while
online. It is, however, a powerful tool designed to protect the integrity
of data transportation so certain websites cannot trace back a Web
session to a particular user–at least not without a lot of extra work.
The Tor Project team claims that its users fall into four categories:
regular people wanting to keep their Internet activities private from
websites and advertisers, people concerned about cyberespionage,
people avoiding censorship in various parts of the world, and military
professionals. The U.S. Navy still relies heavily on the Tor network
as do an assortment of activists and journalists in countries with
strict media censorship policies.
The computers that handle the traffic between the Tor browser and
the Internet are known as Tor Relays. There are actually three
different types of relays that comprise the Tor network: end relays,
middle relays, and bridges. Each of these relay types plays a pivotal
role in the effectiveness of the Tor network as a privacy an
anonymity tool.
End relays (sometimes also referred to as exit relays) are the final
relay before the data transfer leaves the security of the Tor network
and rejoins the public Internet. When a website attempts to track a
user, the IP address the site sees is the IP address of the end relay
being used for that particular request. After that, the trail runs cold
which is why the Tor network works as well as it does. The problem
with end relays is that it becomes possible for the operator of the end
relay to be implicated in any illicit activity originating from that end
relay. When illegal activity is detected, law enforcement and
copyright holders usually target these end relays–it is a risk that not
every Tor user is willing to take.
Middle relays are much safer because they only transfer data
between other relays and clients within the Tor network. Anyone can
setup a Tor middle relay from the comfort of home without having to
worry about any of the data being sent through the relay or any illicit
activity that may stem from the use of Tor.
Using Tor is free and no one is required to operate a Tor relay, but
the more Tor relays that are available, the more secure the system
becomes and the faster it operates. After using Tor for a while, you
may decide to operate a Tor relay to assist the Tor community as its
use continues to expand throughout the world.
To illustrate exactly how Tor works from end to end, consider the
following example. A user opens the Tor browser client that connects
to the Tor network using at least three relays. The connection
between the Tor browser and the Tor network is encrypted as is
every hop between relays. Finally, the transmitted data reaches the
end relay where the request is decrypted and sent through the public
Internet to its final destination.
There are few limitations to the Tor network, but it’s worth pointing
out performance-related issues. New Tor users are especially
confused by how slow the browser seems to run sometimes. The
reason this occurs is two-fold. First, as part of the Tor protocol, all
data must be routed through a minimum of three relays along the
way and these relays could be located anywhere in the world.
Second, the speed of the Tor network is dependent upon how many
relays are active at the time and the overall traffic being handled by
the network at a given moment. While there are times when Tor is as
fast as any other browser, there are times when it is noticeably
slower; especially when working with large data transfers such as
audio and video files. Unfortunately, the slightly slower speeds
associated with using Tor are the price users must endure to remain
anonymous while surfing the Web. This occasional sacrifice is most
certainly worth the benefit received by using Tor.
Chapter 4: Tor Legal FAQ
Please note that this FAQ is for information purposes ONLY and
should not be treated as legal advice. If you have any concerns
about using Tor that are not covered below, please consult an
attorney licensed in your jurisdiction.
General Information
NO. At this time, there have been no reports of anyone living in the
United States being prosecuted or sued for using Tor or running a
Tor relay. Also, running a Tor relay (even an exit relay) is currently
legal under U.S. law.
NO. Laws change all the time as to the technologies those laws are
based on and Tor is no exception to this rule. Neither Tor nor EFF
can guarantee that you will never face legal liability by running a Tor
relay.
Exit Relays
You can learn more about the risks associated with running an exit
relay as well as some recommended best practices by reading
through The Tor Project’s blog.
NO. Law enforcement could seize your computer if the traffic coming
from your exit relay is deemed illegal. Exit relays should not be run
from a residence or using a home Internet connection. A better
option is to operate an exit relay from a commercial facility. The relay
should have a separate IP address and no other traffic should be
routed through it. Avoid keeping personal data on the host computer
and do not use the relay for illegal purposes.
Should my ISP be informed before running
an exit relay?
YES. Let as many people as possible know that you are running an
exit relay. The more people who are aware, the faster government
officials will be able to determine that your IP address is part of the
Tor network. This could prevent your computer from be seized by law
enforcement.
NO. Even if you are capable of modifying the Tor source code to
monitor and log plaintext coming from your relay, you could create
civil and/or criminal liability for yourself under both federal and state
wiretap laws. Never examine any communications traveling through
the exit node without first speaking with a qualified lawyer.
When a user data transmission finally exits the Tor network via an
exit relay (which can be anywhere in the world), the resulting IP
address is that of the exit relay–not the Tor user.
With the shutdown of popular Tor destinations such as the Silk Road,
the anonymity network has received a lot of press (some good and a
lot bad). It’s important to consider the following seven facts about Tor
that remain true regardless of what the media may portray about the
Tor network.
While it’s true that many privacy and security tools can be difficult to
use for the uninitiated, Tor is extremely easy to use. The Tor browser
bundle is the easiest way to get started using the Tor network as it
comes pre-configured to use Tor in a secure manner. Another option
is to use the Tails operating system. This live OS (runs from a DVD
or flash drive) routes the entire Internet connection through Tor and
removes all traces of the session upon being shut down.
Believe it or not, the Tor network is faster now than it has ever been
in the past. Routing data transmissions through the Tor network does
take slightly longer than traditional Web browsing but the Tor
developers have been working diligently to maintain the speed of the
network. The more Tor relays that become available, the faster the
network operates.
VPNs
The catch when using a VPN is that the VPN operator can see
everything done while connected to the VPN service. While many
VPN services claim not to maintain logs of user activity, it has been
proven that many of them actually do keep logs that are promptly
turned over to the authorities in the face of a court order. VPNs are
an excellent choice for low risk situations but they do not provide the
same level of anonymity provided by Tor.
Tor
Also, like a VPN, using Tor protects middle men (such as the ISP)
from monitoring Internet traffic to and from the computer. Perhaps
the only downside to using Tor is that if the exit relay has a malicious
operator, that individual could decrypt and view all traffic leaving the
exit relay. The way to get around this caveat is to ensure all
connections are made using HTTPS. Browser add-ons such as
HTTPS-Everywhere can be used to encrypt all data transmissions so
that even a malicious exit relay cannot view the data being sent
through the Tor network.
For even more anonymity while surfing the Web, some people have
begun using Tor and a VPN together. By combining both
technologies, it is possible to further protect your online identity when
properly configured. For most users, however, using both systems
together is overkill, but it is a viable option for those concerned that
neither technology provides enough layers of anonymity alone.
Chapter 7: What is My IP Address and
How Do I Hide It?
There are three common ways to hide your true IP address online.
The first is the use of a trusted proxy server. A proxy is a service you
connect to before making any other Web-based connections. This
way all Internet traffic is routed from your computer to the proxy
server before reaching its destination. Websites see the IP address
of the proxy server instead of the IP address of your computer.
Finally, use Tor to hide your IP address! Tor also encrypts data
connections between your computer and its final destination while
bouncing the transmission between various relays so it is impossible
to see where the traffic originated. The whole idea behind The Tor
Project is to protect your IP address from prying eyes while providing
a level of online anonymity that is difficult to match using any other
single technology.
Chapter 8: Getting Started with the Tor
Browser Bundle
As you can see from the screenshot above, the Tor browser is setup
just like Firefox with a different splash screen. Users already familiar
with using Firefox will have no trouble adapting to the Tor Browser
Bundle.
As you can see in the screenshot below, the options and settings
available in Tor mimic those found in Firefox.
The latest stable Tor browser release is 4.5.2 and it offers numerous
improvements over the previous version including a patch for the
Logjam attack and updates to numerous Tor components.
• All Platforms
§ Translation updates
• Linux
In cases where the network has firewalls that prohibit access to Tor,
the Tor Browser Bundle can also be downloaded through Gmail.
Send an email to [email protected] and write the word
“help” in the body of the email. You will receive step-by-step
instructions to download and install Tor in these circumstances.
Chapter 9: Installing Tor – Windows
Once the download is complete, find the downloaded file (the default
location should be the Downloads folder). Double click on the
installation file. It should be named torbrowser-install-4.5.2_en-
US.exe. After clicking on the file, a window will open with a warning
about running the software. As long as you downloaded Tor from
The Tor Project’s secure site, click Run to start the installation
process.
Next, a small window will open prompting you to select a language.
Choose the appropriate language and click the OK button. A new
window will appear asking where to install the Tor Browser Bundle.
The default location is the PC desktop. This is fine in most cases but
you can change the installation to a different location if you choose.
Click Install and allow the installation to complete.
Once installation is complete, you have the option of running the Tor
browser before clicking Finish. The browser will open after
connecting to the Tor network and the process is complete. You can
now safely browse the Internet using the Tor network.
To ensure the Tor network has been properly configured, test the
network settings before beginning a browsing session. This can be
accomplished by clicking on the link at the top of the Tor homepage
as shown in the screenshot below.
Chapter 10: Installing Tor – Linux
While this is certainly the easiest way to install Tor, the latest version
of Tor may not be in the repository at the time of installation. This is
especially true of the Ubuntu repos. To ensure you install the latest
version of Tor, add the following repositories to the
/etc/apt/sources.list file:
Notice that these repositories contain Tor for Ubuntu Utopic Unicorn.
You will need to change the name to the version of Linux being used.
If you unsure what version of Linux you are running, use the
following command:
Next, add the gpg key used to sign the packages by running these
commands in the terminal:
$ apt-get update
Tor can now be run as src/or/tor or you can run make install as root
to install Tor into /usr/local/. This way Tor can be started just by
running tor in the terminal.
The deep web gets its name because of its massive size. The public
Internet, accessible via search engines like Google and Bing, only
accounts for a small fraction of the total Internet puzzle. Everything
else is part of the deep web. The deep web is completely
anonymous–in fact, you cannot even access the deep web unless
you are also anonymous. This is why the Tor browser is used to
access these otherwise unseen parts of the Web.
It’s worth pointing out that there seems to be some confusion about
the difference between the deep web and the dark web. Mainstream
media often portrays these two words as interchangeable when, in
fact, they are not. The deep web refers to everything that is not
accessible via the surface Internet (i.e. searching Google). The dark
web, also known as dark net, is merely a small subset of the deep
web and it refers to computers and networks that are not accessible
at all without being invited into these groups. In other words, the dark
web is still inaccessible via Tor unless you are invited to join a
network that is a part of this elusive deep web component.
Since you can’t use Google or other popular search engines when
accessing the deep web via Tor, you need to learn how to navigate
throughout the deep web. The easiest way to start finding interesting
sites that can only be accessed via the deep web is to check out
thehiddenwiki.org. This site is an anonymously maintained directory
of .onion sites that can be viewed when using the Tor browser. The
Hidden Wiki and other .onion directories are covered in more detail
in Chapter Fourteen but suffice it to say that this is one of the best
resources available for people first starting out on an expedition into
the world of the deep web.
1. Use Tor
Whether you are looking for content or services that aren’t included
in the normally accessible Web or you simply value the privacy and
anonymity afforded by the Tor network, use Tor! Using Tor as often
as possible keeps your identity safe while online and it also helps to
diversify the traffic on the Tor network. If everyone only used Tor for
illicit activities, it could be reasonably assumed that every Tor users
should be investigated. By using Tor for mundane tasks and normal
browsing activity, it helps to further protect the anonymity of
everyone using the network–no matter what they are doing while
online.
2. Ditch Windows
Tails OS
The Tor browser still runs on top of whatever operating system you
are using. This mean that Tor is only as secure and safe as the
system running the browser client. The Tor client, any Tor-secured
applications, and the operating system of the machine should all be
updated regularly. Check for updates at least once a week (every
day is even better) to ensure your system is always working as it
should and is not vulnerable to security exploits that may have just
recently been discovered.
4. Don’t Use HTTP
It’s important to remember that Tor is only useful for anonymizing the
original location of any Internet traffic you send out. Tor does nothing
to protect the data already on your computer and the only real way to
ensure the integrity of this data is to use strong encryption
standards. LUKS and TrueCrypt are both examples of high-quality
encryption programs that can ensure the safety of your sensitive
personal data even if someone were to remotely access your
machine.
Although this guide recommends the Tor Browser Bundle for people
just getting started in the world of anonymous surfing and the deep
web, the Browser Bundle isn’t the only, or even the best, way to
leverage the power of Tor. The FBI’s recent takedown of Freedom
Hosting was only possible due to vulnerabilities within the Tor
Browser Bundle. A better option is to install Tor and use it to protect
the communications of other browsers compatible with the Tor
network.
If you are using the Tor Browser Bundle, these features should
already be disabled by default. Also, add-ons such as NoScript
prevent active code from running in the background of a particular
webpage to provide another level of anonymity while browsing with
the Tor network.
When searching for information via Tor, stick with search engines
that do not log your IP address or store cookies on your computer.
Good search engines to use in Tor include Startpage and
DuckDuckGo.
While these are only a few of the many things you can do to increase
your anonymity online, it is a good place to start and will allow you to
avoid many of the mistakes made by novice Tor users.
Chapter 13: Top Tor Links and
Resources
The first time you enter the deep web it may seem rather daunting.
Where do you go? What do you do once you get there? The truth is
that you can do pretty much anything on the deep web–many of
these activities simply aren’t available on the surface Internet. Some
of these services are illegal; others are perfectly legal. In this
chapter, you will learn about some of the top links that can be found
on the deep web by using the Tor browser.
Using just one of the many hidden directory listings accessible via
the Tor network, you quickly begin to see just how much of the
Internet is out there that you’ve probably never seen before. Below
you will find a breakdown that includes much of the information and
services available on the deep web.
Search Engines
There are quite a few search engines that work well with Tor.
Unfortunately, using Google, Bing, or other popular search engines
is problematic when using the Tor network. First, these search
engines are unable to index .onion pages so you probably won’t find
what you are looking for. Second, these search engines collect all
kinds of data about you when using their services. Even if protected
by the Tor network, it’s possible that Google and others could collect
personally identifiable information about you while using their search
tools. Better choices when using Tor include:
• TORCH – http://xmh57jrzrnw6insl.onion/
• The Abyss – http://nstmo7lvh4l32epo.onion/
• DuckDuckGo – http://3g2upl4pq6kufc4m.onion/
When you hit the deep web for the first time, be sure to check out
these resources. You will learn valuable information about leveraging
the power of the deep web and gain practice using this powerful
anonymity network to your advantage.
Marketplace
Financial Services
Currencies (both legal and illegal), money markets, exchangers, and
clearing houses are all available here.
Commercial Services
Hosting Services
There are an abundance of deep web hosting services that allow
users to host files, images, or websites using Tor and other
technology to keep transactions anonymous.
Filesharing
Image Hosting
Web Hosting
Blogs/Essays/Personal Pages
Forums
Email/Messaging
Hacking
Politics
Weapons
As you know by now, you can’t open up Google when using Tor to
find the sites and services you are seeking. There are some
browsers that index .onion sites such as DuckDuckGo, but the single
best way to find exactly what you are looking for on the deep web is
to use a Tor directory such as the Hidden Wiki. In fact, many of the
websites and services listed in the previous chapter came from the
Hidden Wiki. But what exactly is the Hidden Wiki and how do you
find it?
The Hidden Wiki is by far one of the best sites available to Tor users
when looking for hidden services embedded within the Tor network.
The Hidden Wiki is full of hundreds of thousands of links that lead to
a myriad of places that are only accessible through the deep web.
Everything is categorized and in most cases there is a short
explanation next to each link so you know exactly where you’re
going before you click.
To access the Hidden Wiki, you first need to make sure Tor is
installed and properly configured on your machine of choice. You
cannot access any sites that end with .onion unless you are using
the Tor browser. At the time of this writing, the original Hidden Wiki is
down but the good news about the deep web is that someone almost
always posts a mirror site when things like this happen. One of these
mirrors is http://jh32yv5zgayyyts3.onion/ and when pasted into the
Tor browser, this link will take you directly to a copy of the Hidden
Wiki with links to just about anything you can imagine.
The Hidden Wiki isn’t the only place where you can find cool .onion
sites to visit while journeying through the deep web. Reddit is an
excellent resource for finding out more information about hidden
services offered via the Tor network. This post has some good
resources that are worth checking out
(https://www.reddit.com/r/onions/comments/1zeve6/huge_list_of_hid
den_services/).
Finally, don’t forget to check out the uncensored Hidden Wiki which
can be accessed by visiting
http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page from within
the Tor browser. No matter where you go first, you are sure to find
lots of information that you didn’t even know existed before picking
up this guide and entering the world of the deep web.
Conclusion
As you have seen, protecting your identity and browsing habits while
perusing the Internet isn’t difficult. In just a few minutes, you can
enjoy the anonymity that comes with using the Tor browser without
worrying about who might be watching what you do online.
Even if you had never heard of Tor before picking up this guide, you
now know what Tor is (and what it isn’t), how to install it on your own
PC and configure it for optimum performance, the legal issues
surrounding the use of Tor, what the Deep Web is and how to
navigate through it, and even how to support the Tor network by
becoming a relay operator (if you so choose).
Don’t forget to pick up your Free Tor Tips & Links bonus report at
torbrowserhandbook.com/bonus!
Sincerely,
S.K.