|
|
= Web Browsing with Tor =
|
|
|
Originally, Tor was simply added into the internal proxy settings of any web browser. This left users open to a huge variety of vulnerabilities and fingerprinting methods. As such, the Tor Project developed and launched the [https://www.torproject.org/download/download-easy.html.en Tor Browser]. On top of facilitating out-of-the-box use of the Tor network, it comes with built-in modifications that enhance the security and privacy of users. These come in many forms, such as:
|
|
|
|
|
|
* Security enhancing open-source [https://tb-manual.torproject.org/en-US/plugins.html plugins and addons]
|
|
|
* Refined Firefox update routine
|
|
|
* Anonymised (through uniformity) [https://en.wikipedia.org/wiki/User_agent User Agents]
|
|
|
* A secured internal configuration
|
|
|
* Amnesic; wipes all traces of browsing history between restarts
|
|
|
* ... and much, much [https://www.torproject.org/projects/torbrowser/design more]
|
|
|
|
|
|
|
|
|
Please note that it is '''very dangerous''' to use Tor with any browser other than the official Tor Browser. Choosing to do so will '''SERIOUSLY HURT''' your anonymity!
|
|
|
|
|
|
== See also ==
|
|
|
* [https://tb-manual.torproject.org/en-US/ Tor Browser User Manual (English)]
|
|
|
* [https://www.torproject.org/projects/torbrowser/design 'The Design and Implementation of the Tor Browser']
|
|
|
* [https://www.torproject.org/torbutton/en/design/ TorButton Design]
|
|
|
* [https://www.torproject.org/download/download-easy.html.en Download Tor Browser]
|
|
|
* [https://www.torproject.org/docs/verifying-signatures.html.en Verifying Tor Browser package signatures] |