How to Set Up and Use Tor: Windows, Mac, & Linux

Download ArticleDownload Article

With all of the identity theft and privacy invasion that everyone and their grandmother have experienced, it's no wonder people are looking for new ways to stay anonymous online. One such way is something called the "Tor Network", which is a service where you can bounce around anything that you send to the internet so many times that it can't be tracked.

Method 1
Method 1 of 2:

Windows & Mac

Download Article
  1. 1
    With Windows and Mac, your best option is to use the Tor browser. The Tor browser is a pre-made web browser that will deal with all of the irritating background setup work for you.
  2. How.com.vn English: Step 2 Download the Tor Browser.
    The Tor browser can be downloaded from www.torproject.org, follow this link for Windows, and this link for Mac.
  3. Advertisement
Method 2
Method 2 of 2:

Linux

Download Article
  1. 1
    With Linux, it's a bit more involved. The Linux Tor browser package doesn't include all of the background applications required for Tor to run. The plus side to this method, however, is that Tor will deal with everything coming out of your computer, not just webpages.
  2. How.com.vn English: Step 2 Meet the installation prerequisites.
    Run the following command in a terminal emulator to install all the necessary dependencies: sudo apt-get install proxychains privoxy tor vidalia libboost-system1.49.0
  3. How.com.vn English: Step 3 Configure your settings.
    Next, we need to edit some files to make Tor work. Type in: nano /etc/proxychains.conf and scroll down to where it says #dynamic_chain and delete the pound sign. Then scroll to static_chain and put a pound sign in front of it.
  4. How.com.vn English: Step 4 Set protocols.
    Scroll down to socks4 127.0.0.1 9050 and replace the '4' with a '5'. This is just to make sure that all of the applications are speaking the same language. Hit ctrl+x, followed by y, then the enter key to save the document.
  5. How.com.vn English: Step 5 Forward the port to make it accessible.
    Next, type nano /etc/privoxy/config and find the line containing "forward-socks5" and change the whole line to forward-socks5 / 127.0.0.1:9050 . (Note the spaces) Then save and close the file.
  6. How.com.vn English: Step 6 Open the port.
    Now that the various applications can talk to each other, we need to get Tor configured to work with your entire computer! Type in nano /etc/tor/torrc, and remove the leading pound sign where it says SocksPort 9050 and ControlPort 9051.
  7. How.com.vn English: Step 7 Reboot (the service)!
    We must restart the Tor service for our changes to take effect. Type /etc/init.d/tor restart, and, if you want to be paranoid and you know what this means, type init 6.
  8. How.com.vn English: Step 8 Move onto the GUI.
    Launch vidalia either by typing vidalia, or from the start menu. It will pop up and show an error message, ignore it.
  9. How.com.vn English: Step 9 In Vidalia, click Settings, then Advanced.
  10. How.com.vn English: Step 10 Set up Vidalia.
    Click the radio button "Use TCP connection (ControlPort)", and make sure that it is set to 127.0.0.1:9051 and that Configure ControlPort automatically is unchecked and Authentication is set to none.
    • Change the Tor Configuration File to /etc/tor/torrc and click OK.
  11. How.com.vn English: Step 11 Freedom!
    Restart your computer and launch Vidalia, it will take a good couple of minutes after it starts to actually connect, but when it does, your free to go out online and play!
  12. Advertisement


Expert Q&A

Ask a Question
200 characters left
Include your email address to get a message when this question is answered.
Submit
      Advertisement

      Tips

      Submit a Tip
      All tip submissions are carefully reviewed before being published
      Thanks for submitting a tip for review!

      About This Article

      How.com.vn is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 13 people, some anonymous, worked to edit and improve it over time. This article has been viewed 81,565 times.
      How helpful is this?
      Co-authors: 13
      Updated: June 27, 2022
      Views: 81,565
      Categories: Network Security
      Thanks to all authors for creating a page that has been read 81,565 times.

      Is this article up to date?

      ⚠️ Disclaimer:

      Content from Wiki How English language website. Text is available under the Creative Commons Attribution-Share Alike License; additional terms may apply.
      Wiki How does not encourage the violation of any laws, and cannot be responsible for any violations of such laws, should you link to this domain, or use, reproduce, or republish the information contained herein.

      Notices:
      • - A few of these subjects are frequently censored by educational, governmental, corporate, parental and other filtering schemes.
      • - Some articles may contain names, images, artworks or descriptions of events that some cultures restrict access to
      • - Please note: Wiki How does not give you opinion about the law, or advice about medical. If you need specific advice (for example, medical, legal, financial or risk management), please seek a professional who is licensed or knowledgeable in that area.
      • - Readers should not judge the importance of topics based on their coverage on Wiki How, nor think a topic is important just because it is the subject of a Wiki article.

      Advertisement