As you know, many Internet surfers use all kinds of VPN clients to ensure their own security, allowing them to remain unrecognized on the network or to access blocked resources by changing the external IP address of the computer from which a request is made to a specific page. One of the universal solutions is to use the Tor browser, which in itself is a kind of VPN client or proxy server. But for some reason, most ordinary users believe that it’s enough to simply install the application and run it without performing additional settings. This is not entirely true, since here it is necessary to take into account several nuances associated with the installation of the necessary parameters. How to configure the “Tor” browser, then we’ll try to figure it out in more detail.
What is the Tor browser, and why is it needed?
To begin, let's decide what it is all about. The described browser, despite its similarities with VPN clients and proxy servers, actually works on other principles, using its own Tor network to ensure anonymity. Due to this, not only the external IP of the user terminal changes, but the security of the browser itself is also supported. In terms of access quality, it is a cut above all other customers, but the most important criticism of users (and this is so) is that the speed of opening pages on the Internet leaves much to be desired. Despite this, it can be used to access blocked pages even in situations where similar client extensions pass.
Is it so easy with installation?
Before talking about how to properly configure the Tor browser, a few words should be said about why this is necessary at all. According to most experts, fine-tuning is needed in order to protect yourself from possible problems in the future. This applies to gaps in the program itself, which relate to the so-called zero-day problem. The browser itself is strongly recommended to be constantly updated, because through the old versions the real IP of the user can still be determined sooner or later, because the counter technologies also do not stand still, and everyone understands that users can use this particular software to hide their real addresses. In addition, you should not integrate too many extensions into the browser, as they may contain gaps.
Where to download the installation distribution?
It is best to download the installation distribution kit from the official site (you can also make updates there by installing newer versions).
On the developer’s resource, by default, the English version is offered for download, but in the list below you can find additional language pack files that will need to be integrated after installation.
You can also download the installer from trusted resources that are trustworthy, but in this case you need to understand that the latest version is always available only on the official website, and on all the rest you can find only outdated versions of this software. However, there is nothing wrong with using a Russian-language modification with a rank a little lower.
Note: even when downloading the installer, even from an official resource, some antiviruses may issue a warning about the threat. To save the file, temporarily disable the antivirus and repeat the download operation.
How to install the program?
Now let's move on to the installation. In all recent Windows systems, starting with the seventh modification, the installer file must be run exclusively on behalf of the administrator, using the PCM menu in the "Explorer" for this.
When starting the installer, first select the desired language, and then pay attention to the installation location (by default, the application is installed directly on the "Desktop").
After that, wait until the files are copied.
Instructions for "dummies." How to set up a Tor browser: first launch of the program.
Now that the browser is installed, it must be started using the executable file in the folder or shortcut created on the “Desktop” if at the end of the installation you agreed to create it. Next, we will see how to set up the Tor browser in Russian, assuming that such a version was originally downloaded, or that an additional language pack of the SIG format was already placed in the program folder.
In the launch window, you can select either a connection or a setting. Settings may be required only if the use of this browser in your country is officially prohibited, or you use a connection through a proxy to connect. In other cases, you can immediately click the connect button.
This will be followed by a connection to the Tor network, and at the end, when using outdated versions of the program, you may need to perform a network check (in the latest versions, it is not needed). Now you can enter the address of the blocked resource and make sure that everything works.
Configure NoScript Extension
But this is only half the story. Speaking about how to properly configure the Tor browser on a PC, you should pay attention to the NoScript plugin, which is not configured on its own.
To access the settings, use the button marked with the letter "S" on the top panel, then uncheck the box for removing global restrictions, although this is not safe, then set or remove restrictions for trusted and untrusted sites.
How to properly configure the Tor browser for anonymity: hidden options
Now let's pay attention to hidden settings that are not available through the main menu. In the Tor browser, you need to configure at least three more parameters.
First, enter the combination about: config in the address bar, and then accept the warning about the loss of warranty.
Next, in the search, set the combination shown above, open the RMB menu, select the switch point and change the value true to failse.
Now in the browser "Tor" you need to configure one more option.
Using the method described above, search for the parameter shown and change its value from two to zero.
Finally, you can finally configure the Tor browser for comfortable operation by changing the first parameter of the third parameter network.http.sendSecureXsiteReferrer, provided that your browser version has it. In the described modification, such a setting is not needed.
Note: sometimes it’s advisable to change the parameter shown in the image above by setting a deuce instead of one. At the very least, such an action is recommended, but not mandatory.
In principle, after installing the options proposed above, you can be confident in your safety, and additional settings or changes to key parameters will not be required. You can only experiment with the appearance settings.