c54992edb8 The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. Use the Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Advanced Onion Router Web Site Categories Cryptography, Firewalls, HTTP Servers, Plugins and add-ons License OSI-Approved Open Source Features Portable: writes settings to application folder, does not write to the system registryRead-only mode, when running from read-only media - no files are writtenAll configuration files can be encrypted with AESAll-In-One application - it can replace Tor, Vidalia, Privoxy/Polipo, cntlm, and moreSupported proxy protocols: Socks5, Socks4, HTTP, HTTPS (all on the same port, autodetected)Support for corporate (NTLM) proxiesPoint and click process interceptor that can redirect all connections of a program, disallow non-supported protocols and restrict some information about the local system (fake system time, fake local hostname, etc.)Banlist for addresses and routersHTTP header filtering that generates fake identity-dependent headers every time the identity is changedCircuit builder that allows building circuits by specifying a node list and that can estimate good circuitsNodes can be banned / added to favorites from any existing circuit or from router selection dialogsCircuit priorities can be changed from the "OR network" pageAS path estimations for all circuits with the option to build only circuits that don't have AS path intersectionsAvoid using in same circuit nodes from the same countriesCircuit length is optional and can be changed to have between 1 and 10 routersBetter isolation between private identities (delete cookies from 5 supported browsers, expire an internal cookie cache, delete Flash/Silverlight cookies, generate new fake browser identity information, and more)A list of favorite processes that can be started and intercepted at startupAll child processes created by a process that is intercepted are also interceptedPlugin supportHot keysMulti-language supportOnion address generator that can generate .onion addresses with a given prefixAutomatic IP / identity changes that can use a configurable exit selection algorithm KEEP ME UPDATED By clicking on "Follow" below, you are agreeing to the Terms of Use and the Privacy Policy. Almost any other web browser configuration is likely to be unsafe to use with Tor. For privacy reasons, the list of web pages you visited and any cookies will be deleted. Make sure you have at least 80MB of free disk space in the location you select.
Follow You seem to have CSS turned off. .. It also enables software developers to create new communication tools with built-in privacy features. Sign up for the SourceForge newsletter: I agree to receive quotes, newsletters and other information from sourceforge.net and its partners regarding IT services and products. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Software & Services Tor Browser Arm Orbot Tails TorBirdy Onionoo Metrics Portal Pluggable Transports Shadow Tor2Web What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. To use the Tor Browser again, double click on the "Start Tor Browser" application.
Hengeor replied
428 weeks ago