How to configure torus browser

Anonim

How to configure torus browser

Tor Browser is one of the most popular browsers, which provides the replacement of the IP address with a unique method - computers are performed as computers of real users with active sessions. It is the principle of operation of this web browser that attracts many users interested in anonymous web pages or a substitution of their location. In addition, the Thor opens resources with registration on the pseudo domain of the top level .ONion, because such sites are not indexed by the familiar search engines. As part of this material, we would like to tell about all the features of the configuration of the mentioned browser for comfortable and safe surfing.

Configure Tor Browser for comfortable and safe use

Next, we will talk about configuring Tor Browser through the menu with parameters and special configuration files. To do this, you will only need to download and install this web browser. All the screenshots below are made on the Russian version, so we recommend downloading the assembly with this language pack, so as not to be confused in the menu items.

Entrance and weekend nodes

Nods call all computers connected to one TOR network. As you know, each active browser user can become one of the nodes of the chain, the final or intermediate, since it consists of three stars. However, this technology is managed and accessible to configuration through a configuration file. There, the user allows or limits the entrance and weekend nodes. The entrance nodes call the participants from which the chain will begin, the weekends - the users who will become the final links. All setting is in choosing countries, and it happens as follows:

  1. Open the folder with the web browser and go along the path "Browser"> Torbrowser> Data> Tor. In the directory, find the file "Torrc" and double-click on it with LKM.
  2. Go to folder with configuration file Tor Browser

  3. Start using a standard notepad or any convenient text editor.
  4. Run a configuration file from the Tor Browser folder

  5. At the bottom, add the string exitnodes {US} - it is responsible for the fact that the IP address of the specified country will be the end link.
  6. Making one country as an output node in the Tor Browser configuration file

  7. You can set codes of countries through commas, indicating all available locations. Then the string will find something like this: exitnodes {kr}, {ru}, {sy}, {cn}.
  8. Making a list of countries as a weekend node in a configuration file

  9. There are countries as input points in about the same principle where the team changes to entrynodes, and state codes fit in the same way.
  10. Making a list of countries as input nodes in the Tor Browser configuration file

  11. In addition, the restrictions on the use of certain countries are given and the route is also set:

    EXCLUDENODES {Code_strana}, {Code_Stran}

    STRICTNODES 1.

    Ban on the use of countries as nodes in Tor Browser

    EXCLUDEEXITNODES is used as limiting endpoints, where the next line is also necessary to enter StrictNodes 1, because the "StrictNodes" parameter obliges Tor to consider custom configurations to limit compounds.

  12. Upon completion, save the settings and close the configuration file. The folder will create its original copy that can be renamed at any time, thereby restoring the initial content.
  13. Created copy of the original configuration file

  14. Make sure the editing has passed successfully. To do this, simply start TOR and go to the IP check site. There you will find all the necessary information.
  15. Check IP addresses and countries when using Tor Browser

Sometimes it is required to specify quite non-standard countries for input points or exit. In this case, there is no idea of ​​their codes, which causes various difficulties or errors when entering. Avoiding them will help appeal to the table, in which all codes in the correct ISO 3166-1 format are written. It is located on the famous Wikipedia website, and you can go to it by clicking on the link below.

List of country codes in ISO 3166-1 format

Connection at startup

During the first and subsequent startups of the browser on the screen, the network setup screen appears. It usually disappears after the first successful configuration, and when errors appear with the connection becomes active again. In it, the user is proposed to properly configure the connection, specifying the available ports, proxy or bridges. With a proxy server, everything is quite simple - you need to click on "I use a proxy for connecting to the Internet" and fill out the form that appears in accordance with the available data.

Using a proxy when connected to Tor Browser

With ports, too, everything is extremely clear - the settings of the firewall are sometimes blocked by the use of certain ports, which causes the need to specify permissible. Set of port numbers is carried out through the comma.

Selecting available ports when connected to Tor Browser

Problems occur most often from those users who have Tor blocked by the provider. Then any attempt to connect to the network is interrupted. It is solved only by installing the bridge. Such a function added developers and organized its correct operation, which allows one of several options.

Selecting a built-in bridge

The developers have built several types of bridges that organize a secure connection. They are written in different technologies in different programming languages, which makes them more resistant to protective mechanisms of Internet service providers. You only need to mark the "Select Built-in Bridge" marker and specify one of the available options. Next, by checking the performance, the optimal bridge is selected.

Select one of the built-in bridges when connected to Tor Browser

As for the difference in all those present by Bridges, you can familiarize yourself with them in the official documentation of the web browser developers. There is information on each technology, their detailed descriptions and links to full sweeps published on GitHub.

Official documentation on the variety of bridges used in Tor Browser

Bridge request directly

If no of the current built-in bridges does not work, you should try to request a bridge from the official site. In reliability, it will be more effective, but its receipt depends on the possibility of connecting to the resource itself.

  1. Mark the "Request Bridge from Torproject.org" by the marker and click on the appropriate button for the bridge request.
  2. Automatic receipt of the bridge from the official site Tor Browser

  3. Expect conversion completion. In the case when it lasts for several minutes, interrupt it and go to the next method of obtaining a bridge.
  4. Waiting for the bridge from the official site Tor Browser

  5. If you successfully communicate with the server, a notification will appear asking for capping.
  6. Enter Capps for automatic receipt of the bridge from the site Tor Browser

  7. The bridge will then be provided, and on this connection procedure is completed. If necessary, you can always ask for a new address.
  8. Use the resulting bridge to connect to Tor Browser

Manual getting bridge

In some situations, no of the above options will be effective, since providers use advanced protection technology. Then you have to go to the official website with bridges through any working browser and get it manually, but this is done like this:

Getting bridges on the official website BridgeDB

  1. Go to the above link and click on "Step 2 Get Bridges".
  2. Getting bridges on a special Tor Browser website

  3. A normal receipt mode is available or through the definition of additional parameters. Here choose the option at your discretion.
  4. Selection of the method of obtaining bridges on a special site Tor Browser

  5. Next is injected.
  6. Enter Capcha for manual receipt of the bridge from a special site Tor Browser

  7. A selected address will appear on the screen, it must be copied to the clipboard.
  8. Copying the resulting bridge from a special site Tor Browser

  9. In the Tora itself, you should mark the marker "Specify the bridge that I know" and enter the address received. After that click on "OK".
  10. Entering the manual bridge for connecting to Tor Browser

Now you have an idea of ​​how to configure the connection to the first and further launches of the browser under consideration. Let's move on to the following configuration items.

Safety regulations

When working with a torus, it is important to make this process safe, because often users love to go to suspicious resources or even download various files. There are several parameters to which you need to pay attention to:

  1. In the address bar, enter About: Config and press Enter. When displaying a notification, click on "I take the risk!".
  2. Go to section with configuration in Tor Browser

  3. You will display a list of all available parameters. Through search, find JavaScript.Enabled and double-click the LKM on the displayed line so that the value has changed to "false". Such an action will disable the use of JavaScript absolutely on all sites.
  4. Disable JavaScript through configuration settings Tor Browser

  5. Next, it will be necessary to disable HTTP Referer to avoid saving the first source address when traveling on the links on various pages. To do this, find the Network.http.sendrefererheader parameter twice click on the value.
  6. Search for HTTP Referer parameter in Tor Browser configuration

  7. Install it in the 0 state and save the settings.
  8. Disable HTTP Referer in Tor Browser configuration

All actions with configuration parameters are completed, now you need to finish the started by using the settings embedded in the browser, because almost all the default values ​​do not provide reliable protection.

  1. Open the menu by clicking on the three horizontal strips on the right above, and go to the "Settings" section.
  2. Go to settings through the Tor Browser menu

  3. Here move to the Privacy & Security category.
  4. Go to security settings in Tor Browser

  5. First of all, make sure that the history of the views will never be saved.
  6. Setting the search history history in Tor Browser

  7. Cookies set up at your discretion. For complete safety, they can be turned off, but sometimes it suffers to display the contents of the pages.
  8. Setting up cooking cookies and data sites in Tor Browser

  9. Turn on tracking protection by setting a marker to the desired item. Below is the parameter responsible for sending notifications to sites that you refuse to use online trackers, it can also be set at your discretion.
  10. Select tracking mode when setting up Tor Browser

  11. Separate attention to permissions by turning off the microphone activation, camera and location detection. Be sure to make sure that the installed tick is near "block pop-up windows".
  12. Selecting permissions for sites when configuring Tor Browser

  13. Below is one of the unique functions of Tor Browser - "security level". It has three modes of operation, each of them limits the launch of certain tools, which makes it possible to increase protection. Check out the description of all modes and select Optimal for yourself.
  14. Setting the security level when setting up Tor Browser

  15. In addition, the developers recommend changing the preferred page display language to increase anonymity. This is done in the section "GENERAL". Near the "Language" item will need to click on "Choose".
  16. Go to the selection of page display language in Tor Browser

  17. Select a language from the list or add a new one.
  18. Select the page display language when setting up Tor Browser

We paid special attention to scripts, such as JavaScript and HTTP Referer, as they have certain vulnerabilities used by intruders to distribute threats or hacking computers. The remaining items are standard and basic rules of secure Internet surfing.

Supplements

The developers have built two useful additions to TOR, which increase protection when switching to suspicious or unverified sites. One of them limits the launch of the scripts, and the second automatically redirects to the secure HTTPS protocol, if it is considered possible. Let's analyze them in more detail.

  1. Open the web browser menu and go to "add-ons".
  2. Transition to add-ons through the menu in Tor Browser

  3. Make sure that each of them is active and click on "HTTPS EVERYWHERE".
  4. Selection of HTTPS EVERYWHERE Add-on in Tor Browser

  5. This extension settings have little, you can only install the update mode of versions and make sure that the check mark is a check mark near the important "Automatic Updating Rule Sets" item.
  6. Setting up HTTPS EVERYWHERE add-on in Tor Browser

  7. Let us turn to a more interesting tool - "Noscript".
  8. Selection of Noscripts Add-ons in Tor Browser

  9. In a new configuration window, you see three "Default" tabs, "trusted" and "untrusted". Tick ​​all the scripts that you want to disable or enable on the pages of different types. Once again we clarify that the disabling of these tools increases safety, eliminating vulnerabilities for transmitting viruses.
  10. Setup Noscripts Add-ons in Tor Browser

  11. You can enter the address of a specific site to add it to one of the types of pages or configure individual rules.
  12. Adding a site to the exceptions of NOSRIPTS in Tor Browser

  13. Next, we recommend moving to the "Personalization" section.
  14. Transition to Personalization in Tor Browser

  15. Here are the icons of the mentioned scripts. Move them to the top panel to speed up the management of them if necessary.
  16. Adding add-on shortcuts to a quick access panel to Tor Browser

In addition, we note that the installation of additional extensions and plug-ins is not recommended, since they reduce the overall level of security and can be used by intruders as vulnerabilities for transmitting malicious code or files.

Search engine setup

As mentioned earlier, Tor Browser allows you to move to sites registered on the .ONion domain. If you use Google search engine or, for example, Yandex, then such resources will not be found. There are specially created search engines that allow you to find solely on the mentioned domain. If you are interested in this process, it is recommended to save the found search engine so as not to enter it every time.

  1. Through the menu, go to "Settings".
  2. Go to Tor Browser settings to select a start page

  3. Here in the "General" section, find the Home Page field and insert the search engine found.
  4. Installing a search engine as a start page Tor Browser

  5. When you start the browser, you will get to the desired page so that you can immediately go to the search.
  6. Displaying a search engine in the quality of the Tor Browser start page

  7. The number and quality of the displayed results depends only on the search service used, because all of them have different algorithms.
  8. Work in search engines Tor Browser

  9. To always be able to get to the site page, click the asterisk icon and add it to the bookmarks panel.
  10. Adding a search engine to the Tor Browser bookmarks

From time to time, any resources can change, so it is better to have several alternatives in stock. They are added to the bookmarks panel in the same way and stored even after restarting the browser.

Working with sites

When all the pre-editing is completed, each user wants to climb on various sites in search of the necessary information. It must be borne in mind that each page is applicable to their settings that allow you to change the connection circuit or set personal permissions.

  1. After transition to the page, click on the green blossom icon. Here you will immediately see the chain chain. If she does not suit you or works with failures, click on the "New Scheme for this Site".
  2. Creating a new connection circuit in Tor Browser

  3. In the "Site Protection" section, there is a button to go to an additional configuration.
  4. Go to Detailed Site Management in Tor Browser

  5. The first tab indicates the authenticity of the resource, information on privacy and technical details.
  6. General information about the site in Tor Browser

  7. "Permissions" is responsible for installing the privileges of the resource, such as inclusion or disable Flash Player, loading images, receiving access to the screen or launch pop-up windows. All this is configured individually for the requests of the user.
  8. Setting up individual permissions for the site in Tor Browser

  9. In the Multimedia tab you will find a list of all images and video recordings. This will help track visible and invisible content displayed on the page, and learn direct links to this data.
  10. Displaying a media system on the site in Tor Browser

Now you are familiar with all the main aspects of the configuration of the browser toruster. As you can see, there are many important parameters responsible for the convenience and safety of surfing. It is important to choose the right setting to create perfect conditions individually for yourself.

Read more