Tor Browser logo

Tor Browser

Shields internet activities from surveillance and tracking.

Made by The Tor Project Inc.

  • Proxy

  • internet-security

  • Privacy Tool

  • onion

  • Anonymity

  • mastering

  • dark-web

  • ipmask

  • Anonymizing Network

  • Security & Privacy

What is Tor Browser?

Tor is a free, portable software and an open network that helps defend against a form of network surveillance known as traffic analysis, which threatens personal freedom, privacy, confidential business activities and relationships, as well as state security. Tor works by bouncing your communications around a distributed network of relays run by volunteers worldwide, preventing those watching your internet connection from learning what sites you visit and the sites you visit from learning your physical location. Tor is compatible with many existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol

Highlights

  • Protects user identity and anonymity online by routing traffic through three separate servers before reaching the destination
  • Enables businesses to view competitor information, keep strategies confidential, and ensure internal accountability
  • Allows IT professionals to verify IP-based firewall rules, bypass security systems to access sensitive information, connect to deployed services, and access otherwise restricted internet resources
  • Enables activists, whistleblowers, journalists, and researchers to report on local events safely and anonymously from dangerous locations
  • Provides citizens in internet black holes secure access to research opposing viewpoints and state propaganda

Platforms

  • Mobile iPhone
  • On-Premise Windows
  • Desktop Mac
  • Mobile Android
  • Desktop Windows
  • Mobile iPad
  • Linux
  • Windows
  • Cloud, SaaS, Web-based
  • Web-based
  • Mac
  • Desktop Linux
  • BSD
  • On-Premise Linux
  • Desktop Chromebook

Languages

  • English

Social

Features

    • Support for Multiple protocols

    • Portable

    • Online Anonymity

    • Debian package compatible

    • Built-In Proxy

    • Local Search

    • Bypass Firewall

    • Remote Deployment

    • Mobile friendly

    • Privacy focused

    • Traffic Analysis

    • Distributed network

    • Graphical User Interface

    • Support for FTP

    • Torrenting

    • Bypass Censorship

    • Security focused