Install Tor on Linux

This how-to explains a clear and step by step 5-minute process to install the Tor Browser Bundle onto Linux. The Tor Browser Bundle is free and open source software designed to protect your privacy while browsing online.

Note: If the steps listed below are done and Tor does not work, there may be a problem with the firewall settings or the set up of the computer. To fix these problems Visit here

Steps

Using the GUI

  1. Download the Tor Browser Bundle for Linux to your Downloads folder.
  2. Extract the Archive.
    • Open your Downloads folder
    • Right-click the new file and select "Extract Here"
  3. Start the Tor Browser
    • Click the file "start-tor-browser" in the new folder (tor-browser_en-US).
  4. Wait one minute. The Tor Browser bundle will open a browser and you can now browse the internet through Tor's open network.

Using the CLI

  1. Download the Tor Package for Linux.
  2. Open up a terminal window.
  3. Unzip the package by typing

    tar xzf tor-X.X.X.XX.tar.gz
    Note: x.x.x.xx is the version number.
  4. Change the working directory to the newly unzipped folder by typing

    cd tor-X.X.X.XX
    Note: x.x.x.xx is the same version number as before
  5. Configure and make the files by typing

    /configure && make
  6. Install and run Tor by typing

    src/or/tor
    Or by typing
    make install
    Tor
  7. Make sure you have Privoxy. To use the recently installed Tor on Linux, Privoxy must also be present. Privoxy does not come with the Linux package like it does with the Mac and Windows packages.

Warnings

  • Read the ample Warning documentation provided by the Tor website.
  • When using Tor there are a few items to consider. First, Tor does not anonymize all internet traffic when first installed. The only traffic Tor makes anonymous is the traffic from Firefox. Other applications must be configured with proxies before they can use the Tor Network. Second, the Tor button in Firefox blocks technologies that can potentially leak identity. These include: Java, ActiveX, RealPlayer, QuickTime, and Adobe plug-in. To use Tor with these applications the settings file must be reconfigured. Third, cookies present before Tor is installed may still give away the identity of the user. To make sure the user has complete anonymity, clear out all cookies before installing Tor. Fourth, the Tor Network encrypts all data up until the exit router of the network. To fully protect your data users should use HTTPS or other trusted encryption. And fifth, make sure to verify the integrity of all applications downloaded from Tor. Applications can potentially be a problem if a Tor router is compromised.

Related Articles

Sources and Citations