Tor Guide for Privacy Seekers
Tor Guide for Privacy Seekers
OF CONTENTS
1. Description
2. Application
3. Structure and principles of work.
4. Setup of Tor
Tor for Ubuntu
Tor for Mac
5. Configuring and running in bridge mode
6. Tuning in the proxy mode
7.Relay mode
8. Adjustment and work with the Vidalia Polipo shell
9. The usage on Smartphone
10. How to check Tor operation?
1. Description
Some words about situation as an introduction
Lately the interest to the anonymous network of Tor grows constantly. And there are quite
enough reasons.
Democratic reforms in the world go at full speed. Now the governments practically of
all countries consider that they have a right to decide, where the citizens can walk to, what
to watch and what to read. Packs of laws, with the best motives stamped by the council
and parliaments, determine sharper the borders of reservations within the limits of which
the existence of users in a global Network is possible now.
A danger foreseen is half avoided
The authorities take care of moral health of the citizens and about the cleanness of their
thoughts paternally. That is very touching. But as usual, nobody finds the time to ask
citizens opinion. And more users in the Internet begin to feel that the limits imposing by
official authority begin to reap in shoulders. And search means to change a situation.
One more tensing moment is Edward Snowdens exposures from that clear that total
shadowing of the special services after all and everybody has already become a really
world scope. Certainly, a great number of people has nothing to hide, but it is extremely
unpleasant to realize that you are under the permanent hubcap of The Big Brother, every
your step is watched and fixed, and someone regularly tries to delve in your dirty linen.
And nobody absolutely doesnt care about for what purpose he does it, with good or bad
intentions.
Tor is a web-browser that provides free and open Internet. Tor has own system of proxyservers, that allows anonymously unite with a few networks simultaneously, providing
protection from listening. Tor is an anonymously-virtual tunnel network that gives an in
cipher information transfer.
Using the browser of Tor, the clients of the Internet have the opportunity of maintenance
of anonymity in a network during the visit of different online resources, during blogging,
sending reports, and also during work with other online applications.
In autumn 2011 the developers of web-browser of Tor got a reward that can be compared
on meaningfulness with Oscar in the world of the cinema, Fund of free POE gave out this
bonus them, and in spring 2012 - reward of EFF Pioneer Awards.
2. Application
More and more people try to save inviolability of private life from special services, which
poke their nose into other peoples affairs. More people try to get rid of from the paternal
caring of officials from the state and want to realize the constitutional right to decide
independently, where to walk, what to choose, where to look and what to do.
And here anonymous network of Tor comes for help. As it can provide separately human
being a considerable weakening of persuasive attention and at the same time taking away
almost all limits on moving on World Wide Web. Tor will hide your personality in
Network, all that you will do in the Internet and all sites that you will visit. And also it will
allow you to go round all blocking your favorite web-sites with lightness, carefully
inflicted to us by favorite governments, which consider sincerely, that know us better.
In addition, the network of Tor has another small practical bonus. It often allows going
round such annoying thing, as ban on IP on different web sites. These are trifles, but very
pleasant.
Private persons use the browser of Tor; especially it is popular among those, who aim to
protect the confidential personal information, and also to protect access to the blocked
data. Due to the hidden services the users of Tor are able to create independently web-sites
and other electronic resources, besides the place where a server is really located, is hidden
carefully.
The Web-browser of Tor is very often used by journalists with the purpose of
communicating with informants safely. Well-known user of this browser is Edward
Snowden, transmitting with the help of Tor different information to the news agencies and
Internet resources.
The employees of non-governmental organizations use the web-browser of Tor in order to
be connected to the special web sites in their foreign business trips, not wishing to
advertize their working activity.
Tor is much liked by civil activists from Fund of electronic borders, seeing this browser
that gives possibility to protect base civil laws and freedoms in a world network. Different
corporations use Tor for safe analysis of work of their competitors at the market. Also the
web-browser of Tor is used by the different special services in order to provide secrecy
during execution of special tasks.
4. Setup of Tor
Tor for Windows. Downloading of Tor Browser Bundle.
Open any browser (Mozilla Firefox, Internet Explorer or other) and enter in an address
line: https://www.torproject.org/projects/torbrowser.html.en. If you find Tor Browser
Bundle by means of the searching system, make sure in the rightness of the address.
Push the large violet button DOWNLOAD, to set up the file of installation of the
program Tor Browser Bundle.
A web site will define your operating system automatically; loading of necessary file will
begin. If for some reasons you want to load the file of installation for other operating
system, you can choose a necessary version from a list.
Many browsers will ask confirmation of your intention to get a file. Internet Explorer 11
displays the field with the orange framing in the lower part of window of browser.
At first it is recommended to save a file on a disk independently of your browser. Push the
button Save. Here is shown the program Tor Browser Bundle version 5.0.4, which was
actual during writing this text. Now, probably, fresher version of the program is accessible.
Setup of Tor Browser Bundle
When the loading finishes you, maybe, will be suggested to open a folder where file was
stored in. By default it is a folder Downloads. Start the file torbrowser-install-3.6.2 enUS.exe by a double click.
After a double click on the file of installation a window will be opened with warning of
origin of the program. It is always needed to take seriously such warnings. It is important
to make sure, that you can trust the set software, that you got an authentic copy from an
official web site on a safe communication channel. You know in this case, that you need
and where to get the program. Downloading was taken from the safe HTTPS web site of
project Tor. Press Run.
The window of choice of the language of Tor Browser Bundle will be opened. Choose a
language from a few variants and press OK.
In a next window it is suggested to choose a folder for setting of Tor Browser Bundle. By
default a desktop is indicated. It is possible to change the place of setting, but while we
leave an address without changes.
You will see a window reporting about completion of setting. Push the button Finish.
Tor Browser will be started automatically. While clean a mark in the point of Run Tor
Browser Bundle. We will go back to the use of Tor Browser Bundle after a while. If you
forgot to clean a mark and the program Tor Browser was started, simply close a window.
Tor Browser Bundle will not be set in the system, as other programs, and will not be
displayed in a menu Starting of your computer.
Open the folder Tor Browser and double click will start the file Start Tor Browser.
At the first start of Tor Browser you will see a window that will allow you if it is
necessary to change some tuning. Maybe, you will want to go back to them later, and
while try to connect to the network of Tor, pushing the button Connect.
After that a new window will appear with green field, which at the start of Tor will be
opened a bit longer.
At the first start of Tor Browser it may need very little more time, that usual, but show
patience. In a few minutes Tor Browser will tune connection. A web-browser will appear
that will congratulate you with successful start.
Unpack downloaded achieves in home catalogue, move into it: there will be the following
executing file
Thats all; now, double click on this file will open Tor Browser
If after double click Tor Browser doesnt open, and instead of that text editor opens, you
should allow execution of scripts in settings of the file manager Nautilus:
If you want to create a label on the appendix in the main Dash menu,
you can read on the Internet it.
Start Tor Browser we move to the site for checking IP.
And if everything is all right, we will see something like this
Where am I from? Of course, from the Germany, and moreover, the operation system is
Windows
Installation of Tor Browser in Ubuntu 14.04-12.04 in the repository
Installation option from a repository not of the latest version: in order to install Tor
Browser Bundle in Ubuntu, open the terminal and do the following steps according to
your system
Look at the version of browser and move on the page with other languages
Mozilla-Firefox
Opposite your version of browser download the package with other languages and install
it
Then enter in the line of address
about:config
Then enter in the line of search
general.useragent.locale
Thats all, and now you just restart Tor Browser.
Now it is possible anonymously to wander about the networks
Thats all, now move on your favourite site and watch videos online, for the example on
YouTube.
Also, here in the point Expansions it is possible to turn off the expansion, which blocks
scripts on the sites:
Thats all, now it is possible to watch also flash videos and scripts will be executed.
But I repeat, this everything breaks safety, for the sake of what we also install this
program.
The website will define automatically your operating system; loading of the necessary file
will begin. If for any reason you want to load the installation file for other operating
system, you can choose the necessary version from the list.
If you use Safari, downloading of Tor Browser Bundle will begin. If you use Firefox you
will be offered to open or save a file. It is always better to save a file, thats why pushing
the button Save. In this instance Tor Browser Bundle version 4.0.8 is presented, being
actual in the moment of publication of this guidance. To the moment of reading, maybe,
fresher version of the program will appear.
A window will appear suggesting to set Tor Browser Bundle by dragging the program in
the folder of applications. Do it.
Now the program Tor Browser is set in the folder of applications.
Use of Tor Browser Bundle
To start Tor Browser in the first time, find the program in Finder or (in more update
versions of OS X) in Launchpad.
After click on the icon of Tor Browser a window will appear with warning of origin of the
program. It is needed to take seriously such warnings. It is important to make sure, that
you can trust the set software, got a true copy from an official web-site on a safe
communication channel. You know in this case, what you need and where to get the
program. Downloading was made from the protected HTTPS web-site of project Tor.
Press Open.
At the first start of Tor Browser you will see a window that will allow you if it is
necessary to change some tuning. Maybe, you will want to go back to it later, but while try
to be connected to the network of Tor, pushing the button Connect.
After it a new window will appear with a green field that at the start of Tor will be opened
a bit longer.
At the first start of Tor Browser it may need more time, than usually, but be patient. In a
few minutes Tor Browser will connect. A web-browser will appear that will congratulate
you with successful start.
You can check, whether you are connected to the network of Tor, visiting
check.torproject.org. If you are connected, a web site will report: Congratulations. This
browser is configured to use Tor.
Web surfing through the network of Tor has some differences from ordinary work in the
Internet. We recommend you to follow these advices for correct work in the web via Tor
and for maintenance of your anonymity.
Now you are ready to the anonymous surfing through the network of Tor.
The matter is that geoip and geoip6 files suddenly appeared in other directory,
C:\Documents and Settings\User\Local Settings\Application Data\Tor. This
problem can be solved by simple copying files to the proper directory.
3. Warning of impossibility to connect to bridge server from outside:
[Warning] Your server (aa.bb.cc.dd:4444) has not managed to confirm that its
ORPort is reachable. Please check your firewalls, ports, address, /etc/hosts file, etc.
The reason is that D-Link router provides the Internet connection via NAT. To
make port 4444 visible outside via global IP aa.bb.cc.dd, it is necessary to
configure port forwarding from LAN out.
Tor-D-Link-port-forwarding.
4. Notice that your contact info is not set.
[Notice] Your ContactInfo config option is not set. Please consider setting it, so we
can contact you if your server is misconfigured or something else goes wrong.
You do not have to set your contact info but you can do that. It can be done in
Vidalia Control Panel -> Settings -> Sharing -> Basic Settings -> here you should
fill the Nickname and Contact Info (your e-mail).
5. Warning of setting the wrong time:
[Warning] Received directory with skewed time (server 82.94.251.203:443):
It seems that our clock is ahead by 56 minutes, 7 seconds, or that theirs is
behind. Tor requires an accurate clock to work: please check your time, timezone,
and date settings.
The time strangely differs almost for an hour (my clock is put forward for 56 minutes), as
though a problem is in summer/winter time. The reason is some bug in Tor server. How to
fix it:
1. Run Tor system and wait for its complete loading (the moment when Tor sets
the connection and its onion icon in the tray becomes green)
2. Open time and date settings and set the time an hour earlier or later. The actual
connection will be lost but it will reset in some time.
3. Wait for about 15 minutes and then return the time back. The connection will be
lost again but then Tor will be back in the normal mode.
After setting of plugin you should choose chooses: Tor proxies for all addresses.
There must be
not forbidden web-sites now.
If you want to know IP-address, appeal to http://www.checkip.com (ip-check.info)
When a user works by means of Tor, an address is different from that got for a provider.
7.Relay mode
Safety and efficiency of Tor network depend on the number of nodes, reliable for traffic
sending. They are called relay nodes. The EFF even held Tor Challenge in order to
stimulate as much users as possible for creating and configuring these nodes. As a matter
of fact, article is devoted to this simple action. For work in relay mode youll need a
server, where Tor Relay will work. You can use your home PC or you can reconfigure a
smart router. I offer another way to use VPS (Virtual Private Server). Tor software is
pretty modest and can easily work on VPS with minimal configuration. Memory of 256
MB or even 128 MB is enough. Disk requirements are low too: it is less than 1 GB. Price
of such server per month is equal to a cup of coffee.
So, we register VPS. It should have a verified outer IP. As for me, I like your server, but
there are a lot of VPSs wit Linux or *BSD on board. As a rule, after purchasing you get a
server with already installed Linux distribution. Choose anyone you like. I will show you
using Debian as an example.
Under the Nickname write in the name of the server. Later youll use it for controlling
server work via special services on TorProject.
In Contact Info line you can write in your contact info (in case if someone will want to
contact with you). You also can leave it, then our server wont be able to let someone
know, whom its owner is.
The last two lines forbid to use our server as Exit Nod of traffic. Otherwise, Tor will try to
use our server for the transmission of outgoing traffic of network on external servers.
Unfortunately, not everyone uses Tor with good intentions, and if traffic abandons Tor
through your server, it can affect you.
In addition, the prescribed configuration compels a server to tell to other participants of
network, that a server is accessible on ports 443 for sending packages and 80 for the report
of information about other servers of network. Thus actually a server will wait reports on
ports 9001 and 9030. In Debian
Tor by default works not from under route and such configuration allows avoiding
problems with connecting to ports.
By means of iptables we will influence necessary connection between ports now.
If there are the special tools of tuning of network screen of iptables in the chosen
distributive, it is possible to use it. It is simpler and more evident to do everything
yourself.
We create the file of /etc/iptables.save.rules of such content:
# Generated by iptables-save v1.4.14 on Sat Jul 5 14:15:04 2014
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [22:1968]
-A INPUT -m state state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -d 127.0.0.0/8 ! -i lo -j REJECT reject-with icmp-port-unreachable
-A INPUT -p tcp -m tcp dport 22 -j ACCEPT
-A INPUT -p tcp -m tcp dport 80 -j ACCEPT
-A INPUT -p tcp -m tcp dport 443 -j ACCEPT
-A INPUT -p tcp -m tcp dport 9001 -j ACCEPT
-A INPUT -p tcp -m tcp dport 9030 -j ACCEPT
-A INPUT -j REJECT reject-with icmp-port-unreachable
COMMIT
# Completed on Sat Jul 5 14:15:04 2014
# Generated by iptables-save v1.4.14 on Sat Jul 5 14:15:04 2014
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [1:104]
:POSTROUTING ACCEPT [1:104]
-A PREROUTING -p tcp -m tcp dport 443 -j REDIRECT to-ports 9001
-A PREROUTING -p tcp -m tcp dport 80 -j REDIRECT to-ports 9030
COMMIT
# Completed on Sat Jul 5 14:15:04 2014
By this we optimize our tor servers work and access to ssh for remote administration.
It is left to prescribe loading of these rules. Usually I prescribe the start of iptables restore in /etc/network/interfaces:
auto lo
iface lo inet loopback
pre-up /sbin/iptables-restore /etc/iptables.save.rules
On Your server the file of /etc/network/interfaces is being rewritten each time at re-starts,
it is therefore possible to do hardly differently.
For example, to put loading rules of iptables in /etc/rc.local. For this purpose in EOF
before exit 0 we put a line.
/sbin/iptables-restore /etc/iptables.save.rules
In conclusion we restart tor server:
# service tor restart
We check that we did everything all right. After a while after restart of file /var/log/tor/log
lines must appear:
Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing
server descriptor.
Tor has successfully opened a circuit. Looks like client functionality is working.
Self-testing indicates your DirPort is reachable from the outside. Excellent.
Performing bandwidth self-testdone.
In hour or two, when information will revive in a database, it is possible to call on
globe.torproject.org/ and, writing nickname of the server in the line of search, to make
sure that the network of Tor was filled up by another point of redistribution of data.
Firstly through a new server traffic will not go. A course of life of Tor Relay is a theme of
the separate article.
UPD: As in distributives the last version of Tor doesnt always lie, makes sense to connect
special repositories.
So for Debian and Ubuntu it can be connected official repository of
torproject.org. For this purpose in /etc/apt/sources.list.d/ we create the file of
torproject.list of next contain:
deb http://deb.torproject.org/torproject.org DISTRIBUTION main
Where instead of DISTRIBUTION we write the version of your distribution
(for example jessie or saucy) Do it
# gpg keyserver keys.gnupg.net recv 886DDD89
# gpg export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add # apt-get update
# apt-get install tor
tor
,vps
,tor relay
The simplest advice: for those who do not want to go through the hassle, it is better to use
Polipo which is a part of all the last assemblies on the website torproject.org. Those who
wish to have more additional features for adjustments should download and set up
Privoxy, and then during installation of assembly exclude Polipo from installation.
2. For Tor system loading and work management the software program Vidalia is used. It
is frequently called graphical shell for Tor.
In the settings of Vidalia there are means to launch Tor and filtering proxy during launch
of Vidalia, launch and stop Tor during operation, look through Tor network map and
others. Work with the Vidalia will be discussed further more elaborately. Tor parameter
settings with the help of the Vidalia shell.
When launching the software program Vidalia a sign Vidalia should appear in the form of
onion. In the operating system Windows it appears in the system tray (near the watch, see
the picture). In the operating system Ubuntu it appears on the taskbar. You can launch the
window Vidalia by clicking a left mouse button on its sign.
1
On the first picture Tor is switched off, on the second switched on.
Now when you have Tor filtering proxy server and Vidalia you can adjust applications for
work with Tor or as they say to tariff applications.
Assembling of the Vidalia Bundle for Windows contains Tor, Vidalia, Polipo, and in the
earlier versions the Torbutton (the number of versions can be seen on the pictures).
If the Firefox is not set up on a computer then the software installation program warns
about that, advices to set up it and repeat installation.
All the standard configuration components are set up by default adjusted for joint
operation.
Further, choose the load directory or leave the suggested:
The software program Tor is set up as a client-side program by default. It uses a built-in
configuration file, and the majority of users do not need to change any settings.
Vidalia settings are clear and comprehensible. Though we briefly enumerate them:
During Tor normal operation, circuits in use should be listed in the lower central window.
At the same time in the neighboring window to the right the servers of a chosen circuit and
their characteristics should be listed. In the upper window their geographical location is
presented.
With the help of the network map you can choose servers according to their belonging or
speed.
- Change the identity (New Identity). It changes Tor circuit and as a result output
IP-address.
After the successful change in tray a message will appear
- Traffic schedule
Shows input and output traffic and Tor data rate:
- Flap Network allows writing out-proxy server (I use proxy for an access to the
Internet) or/and bridge (My provider blocks up an access to the Tor network) (read in
the Internet Tor blocking and how to cope with it.
- Flap Services allows adding addresses and ports of computers in the Vidalia network.
serverSlots = 2
tunnelAllowedPorts = 1-65535
Configuration file is a common text file. It bears the name of torrc (with no extension)
and is located in:
- when using Tor Browser assembly in catalog..\<Catalog Tor Browser>\Data\Tor
- in installation packs - <Documents and Settings\<user>\Application Data\Vidalia
- in Ubuntu Linux operating system in catalog /etc/tor
Software program Tor during loading (reloading) first of all reads configuration file and
sets up operational characteristics in accordance with values of instructions in torrc file.
Torrc file editing can be carried out in an elementary text editor: Notepad, AkePad etc. It
is desirable that before editing you safe original torrc file in the same folder. For example
you add to a name the extension *.bak, *.001 etc.
For changes to take effect you need to reload all Tor system software!
1. Fixation of output or input Tor network node
Intercourse with Tor users shows such a nuance by far not everyone likes constant
change of their IP address.
It will be recalled that output servers in Tor constantly change in a random manner. For a
user it means that his/her IP is unstable. In respect to attended resource a user at any
moment can turn from an American or a Frenchman into lets say Japanese, Hindu or any
other person.
Such method of approach essentially increases the level of anonymity but in certain cases
is unacceptable (for instance during work with websites fixing users session).
In Tor there is a possibility to directly indicate which server should be output. In such case
IP will be constant. Tor creators do not recommend acting this way because it reduces
anonymity. Here a user must decide for him/her what is more essential but I will tell you
how to get rid of a constant IP change.
You will have to edit Tor configuration file, it is called torrc and you can get to it either
through Start -> Programs -> Vidalia Bundle -> Tor, -> torrc, or find in the
folder \Documents and Settings\user\Application Data\Vidalia orrc. Torrc common text
file, it is opened by the notepad.
LongLivedPorts PORTS
The list of ports for services, which tend to establish unusually long connections (among
these are mainly chats as well as interactive shells). Nodal circuits out of Tor routers,
which use these ports, will contain only nodes with most high uptime (typical time of
presence in network) with the purpose of decreasing the probability of nodal server
disconnection from Tor network before closing of flow (by default: 21, 22, 706, 1863,
5050, 5190, 5222, 5223, 6667, 8300, 8888).
MapAddress address:new_address
When a request for indicated address comes to Tor, onion router changes address before
taking up request processing. For example, if you want Tor nodes circuit to be used during
connection to www.indymedia.org with output through torserver (where torserver is a
pseudonym
of
server),
use
MapAddress
www.indymedia.org
www.indymedia.org.torserver.exit.
NewCircuitPeriod NUMBER
Every NUMBER of seconds to analyze the connection status and take a decision if a new
nodal circuit formation needs to be initiated (by default: 30 seconds).
MaxCircuitDirtiness NUMBER
To permit a repeated use of circuit, for the first time collected in a certain composition of
its links the biggest NUMBER of seconds ago, but never join a new flow to a circuit
which served this session during quite a long time (by default: 10 minutes).
NodeFamily pseudonym,pseudonym,
Denominated Tor servers (in a predictable manner, to increase a degree of transparency of
Tor network hierarchy) unite in a family on the basis of general or joint administration,
so you should avoid using any 2 of these nodes related by family ties in one and the
same chain of anonymous Tor routers. Special task of option NodeFamily can be needed
only then, when a server with this pseudonym does not report to which family it reckons
itself, that should be proclaimed by means of indicating the parameter MyFamily in torrc
file on the side of OR server. Multiple indications of this option are allowed.
RendNodes pseudonym,pseudonym,
The list of nodes that should be used as rendezvous points (meeting) as far as possible.
RendExcludeNodes pseudonym,pseudonym,
The list of nodes that in no circumstances should be used when choosing rendezvous
points (meeting points).
SOCKSPort PORT
To notify Tor that connections, which are installed by applications using SOCKS-protocol,
must be bugged in this port. Zero-fill this parameter if you do not need applications
establishing connections according to SOCKS-protocol by means of Tor. (Value by
default: 9050).
SOCKSBindAddress IP[:PORT]
To establish linkage to this address for hearing requests for connection from applications
interacting according to SOCKS-protocol (by default: 127.0.0.1). You may as well
indicate port (for instance, 192.168.0.1:9100), which, it is clear, should be open by
means of corresponding firewall setting on a machine for a specified purpose.
Determination of this option can be repeated many times to carry out simultaneous
(parallel) linkage to a host of different addresses/ports.
SOCKSPolicy policy,policy,
It assigns policies of entering a given server with the purpose of limiting the circle of
clients machines, which are permitted to connect the SOCKS port. Description of these
policies is introduced much as how it is done for output policies (see below).
TrackHostExits host,.domain,
For each of values in the list separated by commas Tor will trace recent connections for
hosts corresponding to this value and will attempt to use one and the same output
(locking) node for each of them. If an ordinary list item is anticipated by the symbol .,
then its meaning will be treated as a corresponding to domain in general. If one of list
items consists of only one point then it displays its universal correspondence to all
path names. This option can turn out to be useful if You frequently establish connection
with the servers which cancel all records of Your finished authentication (i.e. force You to
leave and register again) during carrying out an attempt of TCP/IP-connection address
modification established with one of such servers on Your new IP-address after its next
change. Draw Your close attention that use of this option is disadvantageous for You,
because it allows server to directly associate connection history, requested by a definite IP,
with Your user account. Though basically if anyone needs to collect all the information
about Your stay in server, those who wish in any case can do that by means of cookies or
other means specific for exchange protocol being used.
TrackHostExitsExpire NUMBER
Since servers, being output links of nodal circuit, are entitled to start work and end it at its
own discretion i.e. one way or another arbitrarily, randomly, it is desirable, that
association between host and output node automatically loses its power on the expiry of
some NUMBER of seconds of total network activity absence on the part of a server. By
default 1800 seconds (30 minutes).
Thus Tor can be quite easily configured according to current tasks.
Existent set of Tor instructions is sufficiently big. Consideration of them all exceeds the
limits of the present review. Here only several most typical variants of editing and merely
a part of instructions are presented. The full list and syntax of instructions (in English) you
can find on Tor development engineers website.
Visit https://www.torproject.org/tor-manual.html.en
Press long on the icon of Orbot and Orbot will connect to the Tor network. An icon
illuminates green during connecting to Tor.
Anonymous browsing via Orweb
Since Orbot is set and start, you can use the browser of Orweb for an incognito.
Orweb is well adjusted for work with Orbot and Tor. For example, Orweb does
not keep history of the visited pages or other information about web-sites that
you have visited. Orweb also disconnects JavaScript and flash by default, as
well as Tor Browser Bundle on a desktop. JavaScript and flash in theory can be
used by a web-site for determination of the real IP- address of your smartphone.
For the start of Orweb from within Orbot simply press on the icon of globe in
overhead part of screen of Orbot. Orweb will be opened and will show a report
that he is connected to Tor, if all works correctly. Now you can use the browser
of Orweb for an incognito.
Other programs that work with Orbot
Orbot also can be used as proxy-server for other applications. Any application
that supports proxies in theory can pass the traffic through the proxies of Tor
Orbot. Nevertheless, Orbot contains the list of other programs that can be
adjusted on work with him. For example, you can use for the reliable
communication Gibberbot, for a search through Tor is application of
DuckDuckGo, to look through the Internet with Firefox for Android and by
application of Proxy Mobile, or to set the proxies of Twitter on localhost and
port 8118.
If you have access with administrative rights and you adjusted transparent
proxies, then other applications must work with Orbot in theory, but more
safely, if you use the programs specially tested for correct work with Tor.
Keep in mind that viewing is considerably slower when you use Tor, as usual, because the
process of routing adds overhead costs. However, if you need anonymously to look over a
web or go round censorship, then this decline of speed will be a small pay.