What Tor Browser actually does
- Tor circuits: traffic hops through 3 relays (entry → middle → exit) to hide your IP.
- Fingerprinting defenses: standardized window size, disabled APIs, isolation.
- First-party isolation: cookies/identifiers don’t cross sites.
- Built-in HTTPS-Only and security levels to reduce attack surface.
Goal: make you blend into the largest anonymity set while keeping sites usable.
Install
- Desktop: download from torproject.org (macOS/Windows/Linux).
- Mobile: Tor Browser on Android; on iOS the Tor Project recommends Onion Browser (different engine constraints).
Verify signatures when possible, especially on Linux.
Connect when Tor is blocked (bridges)
- Open Tor Browser → Settings → Connection → Use a bridge.
- Try built-in bridges first; if blocked, request custom bridges from Tor Project.
- Pluggable transports (e.g., obfs4, snowflake) help bypass censorship.
Safe defaults & tips
- Don’t install extensions (they create a unique fingerprint).
- Don’t resize or maximize windows; use the default size.
- Use “New Identity” (broom icon) to reset circuits and state between contexts.
- Security Level: start at Standard; move to Safer/Safest if you can handle more breakage.
- Don’t log into accounts tied to your real identity if your goal is anonymity.
Verify it’s working
- Tor Browser shows a green onion on connect; you can also visit Tor’s check page (linked from the start page).
- Open the circuit view (onion icon) to see the current relays for the tab.
Remember: sites still see what you type. Tor hides network metadata, not your behavior.
Get Tor Browser
Disclosure: not affiliated.