How to Use Tor Browser
Tor Browser routes your traffic through a network of volunteer relays, giving you strong anonymity without trusting any single provider. This guide covers installation on every platform, best practices, and what Tor cannot protect you from.
How Tor Works
Tor (The Onion Router) wraps your traffic in multiple layers of encryption and routes it through three volunteer-operated relays before it reaches the destination. Each relay strips one layer - So no single node knows both who you are and what you are accessing.
- The entry (guard) node knows your real IP but not your destination.
- The middle relay knows neither your IP nor your destination.
- The exit node knows the destination but not your real IP.
- Tor Browser also resists browser fingerprinting by standardising fonts, window size, and other identifiers.
Before You Start – What Tor Is and Is Not
| Tor protects against | Tor does NOT protect against |
|---|---|
| Websites seeing your real IP address | Logging into personal accounts (Google, Facebook, etc.) |
| Your ISP knowing which sites you visit | Malware or viruses on your device |
| Traffic analysis across hops | Exit node reading unencrypted HTTP traffic |
| Single-point surveillance | Global traffic correlation attacks by well-resourced adversaries |
| Access to .onion hidden services | JavaScript-based fingerprinting if scripts are enabled |
ⓘ Always use HTTPS when browsing on Tor. The exit node can read unencrypted HTTP traffic.
Step 1 – Install Tor Browser on Windows
- Go to torproject.org and click Download Tor Browser. Download the
.exeinstaller for Windows. - Run the installer. Windows may show a SmartScreen warning - Click More info → Run anyway. The Tor Project's binary is signed.
- Choose your installation folder and click Install.
- Launch Tor Browser from the Start menu or desktop shortcut.
- Click Connect on the first-run screen. Tor will bootstrap a connection through the network - This takes 10–30 seconds.
- When the browser opens, your traffic is now routing through Tor. Verify by checking what IP this site shows - It should be a Tor exit node, not your real IP.
Step 1 – Install Tor Browser on Mac
- Go to torproject.org and download the
.dmgfor macOS. - Open the
.dmgand drag Tor Browser into your Applications folder. - Launch Tor Browser from Applications. On first launch, macOS Gatekeeper may warn you - Go to System Settings → Privacy & Security and click Open Anyway.
- Click Connect and wait for the bootstrap to complete.
- Once the browser opens, your traffic routes through Tor. Check your IP on this site to confirm.
Step 1 – Install Tor Browser on Android
- Open the Google Play Store and search for Tor Browser - Published by The Tor Project, Inc.
- Tap Install. Alternatively, download the
.apkdirectly from torproject.org if Play Store is unavailable. - Open the app and tap Connect.
- Once connected, all browsing inside the Tor Browser app routes through Tor. Other apps on your phone are not covered - Use a VPN for device-wide protection.
How to Use Tor Safely
- Always use HTTPS sites - Look for the padlock. The exit node can read unencrypted HTTP. Most modern sites use HTTPS by default.
- Do not log into personal accounts - Signing into Google, Facebook, or any account tied to your identity defeats Tor's anonymity.
- Do not install browser extensions - Plugins like Flash or uBlock can leak your real IP or create a unique fingerprint.
- Do not open documents downloaded via Tor while online - PDFs and Word files can phone home to reveal your real IP.
- Do not resize the Tor Browser window - Window dimensions contribute to browser fingerprinting.
- Use the Security Level setting - Click the shield icon and set it to Safer or Safest to disable JavaScript on non-HTTPS sites.
- Accept that Tor is slow - Traffic passes through three relays worldwide. Streaming video or large downloads are impractical.
If Tor Is Blocked in Your Country
In some countries - China, Russia, Iran, and others - Direct Tor connections are blocked. Tor provides bridges and pluggable transports to circumvent this.
- On the first-run screen, click Configure Connection instead of Connect.
- Toggle Use a bridge. You can use the built-in bridges (obfs4, meek, snowflake) or request a custom bridge from bridges.torproject.org.
- Select Snowflake - It disguises your Tor traffic as a WebRTC video call and is currently the most effective option for most censored regions.
- Click Connect. The connection will take longer than normal while the pluggable transport negotiates.
Tor Over VPN – Extra Layer of Privacy
Some users connect to a VPN first and then use Tor Browser. This approach - Called Tor over VPN - Adds a layer of protection:
- Your ISP sees a VPN connection, not Tor traffic. This prevents your ISP from knowing you use Tor at all.
- The Tor entry node sees the VPN server's IP instead of your real IP.
- The VPN provider cannot see what you do inside Tor (they only see encrypted Tor traffic going to the entry node).
The trade-off: you must trust your VPN provider. Choose one with a verified no-logs policy. After connecting, run a VPN leak test before opening Tor Browser to confirm no WebRTC or DNS leaks exist.
When to Use Tor vs a VPN
For most everyday privacy needs - Streaming, public Wi-Fi, hiding your IP from websites - A VPN is faster and easier. Use Tor when you need the strongest possible anonymity: journalism, activism, or research in high-risk environments. See the full Tor vs VPN comparison.
Frequently Asked Questions
Is using Tor legal?
In most countries, yes - Downloading and using Tor Browser is legal. It is used by journalists, researchers, lawyers, and privacy advocates. However, it is blocked or restricted in some authoritarian countries. Using Tor to conduct illegal activities remains illegal regardless of the tool.
Does Tor hide my IP address completely?
Tor hides your real IP address from websites and services you visit. The destination only sees the exit node's IP. However, if you log into an account or allow JavaScript from a malicious site, your identity can still be revealed.
Why is Tor so slow?
Your traffic passes through three separate volunteer-operated relays around the world, each adding latency. The relays are run by volunteers with varying bandwidth. This is the fundamental trade-off for Tor's decentralised anonymity model. For speed, a VPN is a better choice.
Can I use Tor on my phone?
Yes - The official Tor Browser is available for Android on the Play Store and directly from torproject.org. On iPhone, the Tor Project recommends Onion Browser (App Store) as the closest alternative. Note that only traffic inside the Tor Browser app is protected - Other apps still use your regular connection.
Can police track me on Tor?
Tor provides strong anonymity but is not foolproof. Well-resourced agencies have used traffic correlation attacks and exploited browser vulnerabilities to de-anonymise users. Operational security matters - If you log into accounts, use personal email, or download files that phone home, Tor alone cannot protect you. See can police track an IP address.