Download Tor Browser   Tor Browser 5.0.3

Advertisement

Software Specifications


Tor Browser Screenshot
  View more screenshots
Editor Rating
4.5
Version:
5.0.3
Size:
34.20 MB
License [?]:
Open Source
Price:
Not available
Last Updated:
Category:
Privacy and Access Control Software
Developer:
The Tor Project, Inc
Operating System:
Unix Mac Linux Windows XP Windows Vista Windows 7 Windows 8 Windows 10
Additional Requirements:
None
Limitations
Not available

Tor Browser Review

" A powerful application to protect your personal privacy from network surveillance while performing internet activities. "

Tor Browser is an online anonymity tool that allow users to improve their privacy and security on the internet.

It lets you surf and share information without revealing your physical location or browsing habits thus preventing somebody from watching your internet connection and learning what sites you visited.

Using Tor protects the privacy minded against traffic analysis. Traffic analysis is a form of network surveillance that can threaten personal freedom and privacy, confidential business activities and state security.

Tor is also an effective censorship circumvention tool allowing users to reach blocked destinations or websites.

Who uses Tor?
  • Individuals, family and friends:

    Share information without compromising privacy; Prevent websites from tracking them and family members; Censorship circumvention tool to visit blocked content; Use for socially sensitive communication such as chat or forums for rape and abuse survivors.

  • Businesses:

    Research competition or conduct competitive analysis; Keep business strategies confidential; Protect sensitive procurement patterns from eavesdroppers; Facilitate internal accountability.

  • Law enforcement:

    Protect communications, investigations and intelligence gathering online; Security during sting operations; Visiting or surveilling websites without leaving government IP address in weblogs.

  • Journalists:

    Protect research and sources online; Safeguarding members' online privacy and security.

  • Activists:

    Anonymously report abuses from danger zones; Maintain civil liberties online; Whistleblowers to safely report on corruption.


Why need Tor?

Knowing the source of your internet traffic allows other to track your behavior and interest even if the connection is encrypted. Traffic analysis still reveals info such as source, size, timing by focusing on the header used for routing.

Tor helps to reduce the risks of sophisticated traffic analysis by distributing your transactions over several places on the internet so not single point can link you to your destination.

It bounces your communications around a distributed network of relays run by volunteers all around the world, called Tor network.

Note:

Tor can's solve all anonymity problems nor does it provide protection against end-to-end timing attacks. If an attacker can watch the traffic coming out of your computer or arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.

Using Tor

Tor Browser includes everything you need to browse the internet safely. Using any browser besides Tor Browser with Tor is really bad idea. Currently, it is impossible to use other browsers and get the same level of protections as when using the Tor Browser.


Tags

Share

Top Related Downloads
1. Download PornAway PornAway
Protect your kids from adult movies and websites.
2. Download McAfee PGP Personal Privacy Upgrade Patch McAfee PGP Personal Privacy Upgrade Patch
This upgrade resolves the PGP ADK security-related bug.
3. Download IE Internet Security IE Internet Security
Customize and secure the Internet Explorer.
4. Download iProtectYou Pro iProtectYou Pro
Internet filtering, parental control and network monitoring software.
5. Download TrafficQuota TrafficQuota
A quota enforcement extension for Microsoft ISA Server.