Before diving into TOR Browser, I would like to show you the table of contents.
TOR Browser is free and
open-source software for enabling anonymous communication by directing Internet
traffic through a free, worldwide, volunteer overlay network consisting of more
than seven thousand relays in order to conceal a user's location and usage from
anyone conducting network surveillance or traffic analysis. It can also be used
to hide a device's IP address.
The first step is to go to the download webpage of TOR Browser.
Select your operating
system, after selecting your operating system the download will start.
Once the file is downloaded,
open the downloaded file.
Follow the instructions
below:
i) Click “OK” when
prompted.
ii) Click “Install”
when prompted.
iii) Click “Finish”
when prompted.
Done! Now we have installed
TOR Browser on our PC.
To configure TOR Bridges,
the first step is to go to the webpage of TOR Bridges.
Go to the “Advanced Options”
tab, and then select “obfs4” in the “Do you need a Pluggable Transport?” menu.
After selecting “obfs4”,
click on the “Get Bridges” button.
It will ask you to enter the
captcha present on your screen, enter the displayed captcha and then press
[ENTER].
Now you will get the bridges
on your screen, select the bridges and then press Ctrl + V.
Open TOR Browser, and then
search “about:preferences#to
r”.
Go to the “Bridges” tab and
then select “Provide a bridge”.
Paste the copied bridges in
the text box present below “Provide a bridge”.
Done! Now the TOR Bridges
are configured properly, but still, we aren’t ready to use TOR Browser, because
we still need to do some “Privacy & Security” settings.
The first step to configure
the privacy & security settings, is to search “about:preferences#privacy”
in TOR Browser.
Now do the following
changes:
1. Go to the “History” tab,
and then change “Use custom settings for history” to “Never remember history”.
2. Go to the “Permissions”
tab, and then enable “Block pop-up windows”, “Warn you when websites try to
install add-ons” & also enable “prevent accessibility services from
accessing your browser”.
3. Go to the “Security
(Security Level)” tab, and then set the security level to “Safest”.
4.Go to the “Security
(Deceptive Content and Dangerous Software Protection” tab, and then enable
“Block dangerous and deceptive content”, “Block dangerous downloads” & also
enable “Warn you about unwanted and uncommon software”.
Done! Now we are ready to
use TOR Browser.