Originally, Tor was simply added into the internal proxy settings of any web browser. This left users open to a huge variety of vulnerabilities and fingerprinting methods. As such, the Tor Project developed and launched the [https://www.torproject.org/download/download-easy.html.en Tor Browser]. On top of facilitating out-of-the-box use of the Tor network, it comes with built-in modifications that enhance the security and privacy of users. These come in many forms, such as:
* Security enhancing open-source [https://tb-manual.torproject.org/en-US/plugins.html plugins and addons]
* Refined Firefox update routine
* Anonymised (through uniformity) [https://en.wikipedia.org/wiki/User_agent User Agents]
* A secured internal configuration
* Amnesic; wipes all traces of browsing history between restarts
* ... and much, much [https://www.torproject.org/projects/torbrowser/design more]
Please note that it is '''very dangerous''' to use Tor with any browser other than the official Tor Browser. Choosing to do so will '''SERIOUSLY HURT''' your anonymity!
== See also ==
* [https://tb-manual.torproject.org/en-US/ Tor Browser User Manual (English)]
* [https://www.torproject.org/projects/torbrowser/design 'The Design and Implementation of the Tor Browser']