Network "Tor": how to use?

As a rule, some Internet users, for various reasons, try to ensure their privacy, so they regularly consider the main ways to anonymize traffic from the Internet, which are available for use by an ordinary user. In principle, everyday use of a VPN can help in solving this problem, but not everyone will find this method convenient. Therefore, in this article we will talk about TOR - an anonymous distributed network.

network tor

So what is the Tor network

Nowadays, in RuNet, with the advent of state control and toughening the position in relation to ordinary users, we are talking about the further fate of TOR and similar anonymizers. Law enforcement agencies have long been trying to ban the Tor network, reviews of which are extremely positive. Information has already appeared in the media about the “TOR ban” at the suggestion of the Russian security forces. Thus, the newspaper Izvestia contains a direct indication that today there is a proposal by the security forces to ban programs that hide the user's network.

The Public Council under the FSB of the Russian Federation considers it necessary to regulate the activities of legal entities and individuals on the Internet. Therefore, he formulated proposals on the need to ban anonymizers - programs that mask data and an IP address.

If, by a court decision, users’s access to a particular site is denied, users using anonymizer will still be able to access the site (for example, using the search on the Tor network). For example, users from China and Belarus visit sites blocked by local authorities without any problems.

The proposal of the security forces implies a ban on software or browsers in which anonymizers are built in (the Internet network Tor, for example). In addition, web servers are also considered camouflage tools. These are stand-alone sites where users can switch from a different IP address to a blocked site. There is also an indication that such amendments will be introduced into federal law.

To date, the position of the state in this regard has not yet been fully determined.

Tor does not connect to the network

Why is this network needed?

Why would you need a network of "Tor" for ordinary and ordinary users?
Logically, every citizen who does not violate the law should think: “Why should I hide myself on the Internet with the help of an anonymizer? I don’t plan illegal actions - hacking sites, spreading malware, breaking passwords, etc.? ” In a general sense, this question can be answered this way: some sites containing content for free download are blocked very quickly and thus become inaccessible to most users. In addition, some employers restrict access to social networks and entertainment sites, and the resources of the Tor network make it easy to circumvent these prohibitions.

At the same time, one can cite the original opinion of one developer of free TOR software, which he voiced in an interview.

network tor how to use

Expert opinion

Why is anonymity required for ordinary Internet users who, by definition, have nothing to hide?

The thing is that “there is nothing to hide” - this is not a reason for full control of all user actions on the Internet by government agencies. In these structures, the most ordinary citizens work, guided in their work by laws that are incompetently written by other incompetent citizens. If such people do not like something, they will have to spend money, time and health to prove their innocence with an unpredictable result. Why do we need such a risk if there is a simple technical tool that is supported by other, more intelligent people.

Among other things, along with anonymity, the user receives protection from censorship on the network at the state level. Is it worth the ordinary citizen to think which site might be banned today on the initiative of MP Ivanov? This is not the case of this deputy, especially if he will never be informed about which sites the citizen visited at his own request today.

So we can fully assume that the question "why do you need TOR" has already received a complete answer. Now you can consider practical questions about the design of the TOR network and how it is installed and configured on your computer.

how to get into the torus network

Network "Tor": how to use

TOR is a network of virtual tunnels that will allow the user to best protect their privacy and Internet security.

The principle of operation of TOR: the program does not connect the user's computer to the network directly, but through a chain of several randomly selected computers (repeaters), which also belong to the TOR network.

All data sent to the Internet using TOR becomes anonymous (the source is hiding) and remains encrypted for the entire length between the user's computer and the last relay. After the data is sent from the last repeater and sent to the final destination site, this data is already in an open, normal form.

When transferring important data, such as a username or password to enter the site, you need to make sure that the HTTPS protocol is working.

It is worth noting that the emergence of this anonymous network we are obliged to the American intelligence services. Once upon a time there was a spy project that later became notorious. It was called Open Skies and, for some unexplained reason, was curtailed in a short amount of time. After that, all the data of the closed network, in particular the source codes, were in the public domain. On the basis of the information received, the initiative group created a community whose members were experts in the Internet field and began completely free of charge creating their own network, which is not controlled from outside. This private network is called The Onion Router, which means "Onion Router" in Russian. That is why the symbol of the network "Tor" has an image of onion on the logo. This name explains the principle of the anonymizer - a chain of nodes and connections leading to complete privacy can be associated with layers of the bulb. The network works in such a way that the end points of the connection cannot be established.

net search tor

Download and install TOR

Various programs from the TOR package are available for download from the official website of the project. Speaking about the Tor network, how to use it, it should be noted that there is a TOR browser software package. It does not require installation and contains a browser. Most often this is Mozilla Firefox. The browser is pre-configured to securely access TOR to the Internet. You just need to download the package, unzip the archive and run the TOR program.

Using the TOR Brouser Bundle

After downloading the TOR Brouser Bundle software assembly, you need to save the package to the "Desktop" or USB. Typically, this option is convenient for compact solutions when you need to download TOR from a USB flash drive.

Speaking about how to get into the Tor network, it should be noted that the user must have a directory that contains several files. One of them is the start TOR Browser file or “Launch TOR Browser”. It depends on which operating system you are using.

After starting the TOR Brouser Bundle program, the user will first see Vidalia launch and connect to the TOR network. After that, the browser will launch, which confirms the use of TOR at the moment. The TOR network is ready to use.

An important point: you must use the browser that was in the package with TOR, and not the user's own browser.

internet network tor

The TOR browser (Mozilla and the Torbutton plugin) has already made settings for the complete prohibition of JavaScript, settings for https and other parameters for a secure Internet connection.

For the average user, this software package is the best option for working with TOR.

There is also a stationary option for installing TOR. This is a connection to the Tor network using the Vidalia Polipo TOR assembly.

Here is an example installation for Windows 7

You need to download the program from the TOR-project site and install it on your computer.

Safe work on the Internet is carried out only with the Mozilla browser with the Torbutton plugin. If this plugin turns out to be incompatible with the Mozilla browser version, then you need to use the universal FOxyProxy Basic.

Today, TOR developers can offer -bundle packages (Vidalia Bridge Bundle or Vidalia Relay Bundle) for download. They are immediately with the settings "bridges" or "relays".

The need for such additional settings may arise for users whose providers block the TOR network. These are BRIDGE settings that can help if the “Thor” is not connected to the network by default.

the torus does not connect to the network

Correct TOR setting

If the user himself wants to become a member of the TOR project, then you should familiarize yourself with the RELAY settings (relays).

If the provider or system administrator blocks access to the TOR site, then the program itself can be requested by e-mail. In this case, the request is made from the gMail inbox; you do not need to use the email located on Russian free domains.

To receive the English TOR browser package for Windows, you need to send an email to gettor@torproject.org. In the message itself you only need to write the word windows. The subject field may be empty.

A similar method can request a TOR browser for MAC OS. To do this, write “macos-i386”. If you have Linux, then you need to write “linux-i386” in the case of a 32-bit system or “linux-x86 64” for a 64-bit system. If you need a translated version of the TOR program, then you need to write “help”. In the response letter instructions and a list of available languages ​​will come.

If TOR is already installed, but does not work, then this could happen for the following reasons.

During normal operation of the connection, if it does not connect to the Tor network, you can try the following: open the VIdala Control Panel, click on the Message Log and select the Advanced Settings tab. Problems with connecting TOR can be for the following reasons:

1. The system clock is disabled. You need to make sure that the date and time on the computer are set correctly and restart TOR. You may need to synchronize the system clock time with the server.

2. The user is behind the firewall. For TOR to use ports 80 and 443, you need to open the VIdala Control Panel, click Settings and Networks and check the box next to “My firewall allows me to connect only to certain ports.” This will help set up the Tor network and let it work fully.

3. TOR blocking by the anti-virus database. You need to make sure that the antivirus program does not prevent TOR from connecting to the network.

4. If the computer still does not connect to the Tor network, it is very possible that the anonymizer is blocked by the ISP. This can often be circumvented with TOR bridges, which are hidden relays and which are difficult to block.

If the exact reason for the impossibility of connecting TOR is required, then you should send an email to the developers at help@rt.torproject.org and attach information from the logbook.

What is a bridge and how to find it

To use a bridge, it must first be discovered. This is possible at bridges.torproject.org. You can also send an email to bridges@bridges.torproject.org. After sending the letter, you should make sure that the letter itself says “Get bridges”. Without this, a reply letter will not come. It is also important that the sending should be from gmail.com or yahoo.com.

After setting up several bridges, the Tor network will become more stable if some bridges become unavailable. There is no certainty that the bridge used today will also work tomorrow. For this reason, constant updating of the bridge list is required.

How is the bridge used?

If it is possible to use several bridges, you should open the “VIdala Control Panel”, click “Settings” and then “Networks” and check the box next to “My provider blocks the connection to the TOR network”. Next, enter the list of bridges in the field. Then click “OK” and restart TOR.

Using open proxy

If using the bridge does not lead to anything, you should try setting TOR when using HTTPS or SOCKS proxies to gain access to the TOR network. This means that even if TOR is blocked on the user's local network, it is possible to safely use an open proxy server to connect.

For further work, there should be TOR / Vidalia configurations and a list of https, socks4, or socks5 proxies.

You need to open the "VIdala Control Panel" and click "Settings".
Next, click on the “Networks” tab, select “I use proxy to access the Internet”.

In the "Address" field, enter the address of the Open Proxy. This is the IP address or proxy name, then enter the proxy port.

Usually, a username and password are not required. If this is still needed, then they should be entered in the appropriate fields. Select “Type for proxy” as http / https or socks4, or socks 5. Click “OK”. Vidalia and TOR now have proxy settings to access the rest of the network.

On the TOR website today it is possible to find many more different products for other operating systems (Mac OS, Linux, Windows). Thus, the search engine on the Tor network can be used regardless of which device you use to surf the Internet. Differences can only be in individual tinctures regarding the features of a custom OS.

There is an already implemented solution for using TOR for mobile phones, for example, for Android. This option has already been tested and, as it turned out, is quite functional, which is good news. Especially considering the fact that most of the users have moved from computers to convenient lightweight tablets.

TOR system for use in smartphones

As mentioned above, it is possible to configure TOR on a device with an Android platform. To do this, install a package called Orbot. A description of how to download it is on the TOR website.

There are also still experimental packages for Nokia and Apple iOS. However, after a series of tests and improvements, the release of an excellent tool that allows you to achieve uniqueness in the network is guaranteed.

In addition, TOR developers have launched several more anonymizers, such as Tails. This is a Linux-based OS that provides anonymous and secure network surfing. There are a number of products on the Tor website that will be of interest to the user.

TOR also makes it possible to use hidden services for users. Without opening your IP address, you can provide a Web server with an SHH server.
It is clear that such a service does not find much demand among users, although this information is located on the TOR website at the same time as the instruction on how to search in the Tor network.

This was the basic information regarding this most famous and well-functioning anonymizer. Today, there is hope that users will be able to launch the TOR network on their computer and continue to use the secure and anonymous Internet as they see fit.

Source: https://habr.com/ru/post/K2904/


All Articles