If you can't download Tor Browser through our website, you can get a copy of Tor Browser delivered to you via GetTor. GetTor és un servei que respon automàticament als missatges amb enllaços a la versió més recent del Navegador Tor , allotjada en una varietat de llocs menys susceptibles de ser censurats, com Dropbox, Google Drive i GitHub. You can request via email or Telegram bot https://t.me/gettor_bot. You can also download Tor Browser from https://tor.eff.org or from https://tor.calyxinstitute.org/.

Envia un mail a gettor@torproject.org. In the body of the mail, write the name of your operating system (such as Windows, macOS, or Linux). GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download), the fingerprint of the key used to make the signature, and the package’s checksum. Es pot oferir una selecció de programari de "32 bits" o "de 64 bits": això depèn del model de l'ordinador que utilitzeu; consulteu la documentació sobre l'ordinador per obtenir-ne més informació.

GetTor via Twitter is currently under maintenance. Please use the email instead.

El Navegador Tor pot, per descomptat, ajudar els usuaris a accedir al vostre lloc web des d'ubicacions on estigui blocat. Normalment, només cal baixar el Navegador Tor i utilitzar-lo per a navegar per la pàgina blocada per a poder accedir-hi. En llocs on hi ha una gran censura, tenim disponibles diverses opcions d’elusió de la censura, incloent-hi transports connectables.

For more information, please see the Tor Browser User Manual section on censorship circumvention.

If you’re having trouble connecting, an error message may appear and you can select the option to "copy Tor log to clipboard". A continuació, enganxeu el registre de Tor en un fitxer de text o en un altre document.

If you don't see this option and you have Tor Browser open, you can navigate to the hamburger menu ("≡"), then click on "Settings", and finally on "Connection" in the side bar. At the bottom of the page, next to the "View the Tor logs" text, click the button "View Logs...".

Alternatively, on GNU/Linux, to view the logs right in the terminal, navigate to the Tor Browser directory and launch the Tor Browser from the command line by running:

./start-tor-browser.desktop --verbose

or to save the logs to a file (default: tor-browser.log)

./start-tor-browser.desktop --log [file]

Heu de veure un d'aquests errors de registre comuns (busqueu les següents línies al vostre registre de Tor):

Common log error #1: Proxy connection failure

2017-10-29 09:23:40.800 [NOTICE] Opening Socks listener on
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 5%: Connecting to directory server
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
2017-10-29 09:24:08.900 [WARN] Proxy Client: unable to connect to xx..xxx..xxx.xx:xxxxx ("general SOCKS server failure")

Si veieu línies com aquestes al vostre registre de Tor, significa que no esteu connectant a un proxy SOCKS. Si es requereix un proxy SOCKS per a la configuració de la xarxa, assegureu-vos que heu introduït correctament els vostres detalls del proxy. Si no es requereix un proxy SOCKS, o no esteu segur, intenteu connectar-vos a la xarxa Tor sense un proxy SOCKS.

Common log error #2: Can’t reach guard relays

11/1/2017 21:11:43 PM.500 [NOTICE] Opening Socks listener on
11/1/2017 21:11:44 PM.300 [NOTICE] Bootstrapped 80%: Connecting to the Tor network
11/1/2017 21:11:44 PM.300 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
11/1/2017 21:11:44 PM.500 [NOTICE] Bootstrapped 85%: Finishing handshake with first hop
11/1/2017 21:11:45 PM.300 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.

Si veieu línies com aquestes en el vostre registre Tor, significa que Tor no s'ha pogut connectar al primer node del circuit Tor. Això podria significar que estàs en una xarxa censurada.

Intenteu connectar-vos amb ponts i això hauria de solucionar el problema.

Common log error #3: Failed to complete TLS handshake

13-11-17 19:52:24.300 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server 
13-11-17 19:53:49.300 [WARN] Problem bootstrapping. Stuck at 10%: Finishing handshake with directory server. (DONE; DONE; count 10; recommendation warn; host [host] at xxx.xxx.xxx.xx:xxx) 
13-11-17 19:53:49.300 [WARN] 10 connections have failed: 
13-11-17 19:53:49.300 [WARN]  9 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE 
13-11-17 19:53:49.300 [WARN]  1 connections died in state connect()ing with SSL state (No SSL object)

Si veieu línies com aquesta al registre Tor, significa que Tor no ha pogut completar una encaixada de mans de TLS amb les autoritats del directori. Usar ponts probablement solucionarà això.

Common log error #4: Clock skew

19.11.2017 00:04:47.400 [NOTICE] Opening Socks listener on 
19.11.2017 00:04:48.000 [NOTICE] Bootstrapped 5%: Connecting to directory server 
19.11.2017 00:04:48.200 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server 
19.11.2017 00:04:48.800 [WARN] Received NETINFO cell with skewed time (OR:xxx.xx.x.xx:xxxx): It seems that our clock is behind by 1 days, 0 hours, 1 minutes, or that theirs is ahead. Tor requires an accurate clock to work: please check your time, timezone, and date settings.

Si veieu línies com aquesta en el vostre registre Tor, significa que el vostre rellotge del sistema no és correcte. Assegureu-vos que el rellotge s'estableixi amb precisió, inclosa la zona horària correcta. Torneu a iniciar Tor.

Els repetidors pont són repetidors Tor que no figuren en el directori Tor públic.

Això vol dir que els ISP o els governs que intenten blocar l'accés a la xarxa Tor no poden simplement blocar tots els ponts. Els ponts són útils per als usuaris de Tor sota règims opressors, i per a persones que volen una capa addicional de seguretat perquè estan preocupats que algú reconegui que estan connectats a una adreça IP Tor de repetidor públic.

Un pont és només un repetidor normal amb una configuració lleugerament diferent. See How do I run a bridge for instructions.

Diversos països, inclosos la Xina i l'Iran, han trobat maneres de detectar i blocar connexions als ponts de Tor. Obfsproxy bridges address this by adding another layer of obfuscation. La configuració d'un pont obfsproxy requereix un paquet de programari addicional i configuracions addicionals. See our page on pluggable transports for more info.

Snowflake is a pluggable transport available in Tor Browser to defeat internet censorship. Like a Tor bridge, a user can access the open internet when even regular Tor connections are censored. To use Snowflake is as easy as to switch to a new bridge configuration in Tor Browser.

This system is composed of three components: volunteers running Snowflake proxies, Tor users that want to connect to the internet, and a broker, that delivers snowflake proxies to users.

Volunteers willing to help users on censored networks can help by spinning short-lived proxies on their regular browsers. Check, how can I use Snowflake?

Snowflake uses the highly effective domain fronting technique to make a connection to one of the thousands of snowflake proxies run by volunteers. These proxies are lightweight, ephemeral, and easy to run, allowing us to scale Snowflake more easily than previous techniques.

For censored users, if your Snowflake proxy gets blocked, the broker will find a new proxy for you, automatically.

If you're interested in the technical details and specification, see the Snowflake Technical Overview and the project page. For other discussions about Snowflake, please visit the Tor Forum and follow up the Snowflake tag.

Snowflake is available in Tor Browser stable for all platforms: Windows, macOS, GNU/Linux, and Android. You can also use Snowflake with Onion Browser on iOS.

If you're running Tor Browser for desktop for the first time, you can click on 'Configure Connection' on the start-up screen. Under the "Bridges" section, locate the option "Choose from Tor Browser's one of built-in bridges" and click on "Select a Built-In Bridge" option. From the menu, select 'Snowflake'. Once you've selected Snowflake, scroll up and click 'Connect' to save your settings.

From within the browser, you can click on the hamburger menu ("≡"), then go to 'Settings' and go to 'Connection'. Alternatively, you can also type about:preferences#connection in the URL bar. In the "Bridges" section, locate the option "Choose from Tor Browser's one of built-in bridges" and click on "Select a Built-In Bridge" option. From the menu, select 'Snowflake'.

If your internet access is not censored, you should consider installing the Snowflake extension to help users in censored networks. When you run Snowflake on you regular browser, you will provide connection as a proxy to an entry node in the Tor Network, and that’s all.


Firstly make sure you have WebRTC enabled. Then you can install this addon for Firefox or the add-on for Chrome which will let you become a Snowflake proxy. It can also inform you about how many people you have helped in the last 24 hours.

Web page

In a browser where WebRTC is enabled: If you don't want to add Snowflake to your browser, you can go to https://snowflake.torproject.org/embed and toggle the button to opt in to being a proxy. You shouldn't close that page if you want to remain a Snowflake proxy.

You might be on a network that is blocking the Tor network, and so you should try using bridges. Some bridges are built in to Tor Browser and requires only a few steps to enable it. To use a pluggable transport, click "Configure Connection" when starting Tor Browser for the first time. Under the "Bridges" section, locate the option "Choose from Tor Browser's one of built-in bridges" and click on "Select a Built-In Bridge" option. From the menu, select whichever pluggable transport you'd like to use.

Once you've selected the pluggable transport, scroll up and click "Connect" to save your settings.

Or, if you have Tor Browser running, click on "Settings" in the hamburger menu (≡) and then on "Connection" in the sidebar. In the "Bridges" section, locate the option "Choose from Tor Browser's one of built-in bridges" and click on "Select a Built-In Bridge" option. Choose whichever pluggable transport you'd like to use from the menu. Your settings will automatically be saved once you close the tab.

If you need other bridges, you can get them at our Bridges website. For more information about bridges, see the Tor Browser manual.

Users in China need to take a few steps to circumvent the Great Firewall and connect to the Tor network. First, get an updated version of Tor Browser: send an email to gettor@torproject.org with the subject "windows zh-cn" or other operating system (linux or macos).

After installing Tor Browser, you will probably not be able to connect directly to the Tor network, because the Great Firewall is blocking Tor. Therefore, the second step will be to obtain a bridge that works in China.

There are three options to unblock Tor in China:

  1. Snowflake: uses ephemeral proxies to connect to the Tor network. It's available in Tor Browser. You can select Snowflake from Tor Browser's built-in bridge menu.
  2. Private and unlisted obfs4 bridges: contact our Telegram Bot @GetBridgesBot and type /bridges. Or send an email to frontdesk@torproject.org with the phrase "private bridge" in the subject of the email. If you are tech-savvy, you can run your own obfs4 bridge from outside China. Remember that bridges distributed by BridgeDB, and built-in obfs4 bridges bundled in Tor Browser most likely won't work.
  3. meek-azure: makes it look like you are browsing a Microsoft website instead of using Tor. However, because it has a bandwidth limitation, this option will be quite slow. You can select meek-azure from Tor Browser's built-in bridges dropdown.

If one of these options above is not working, check your Tor logs and try another option.

De vegades, els llocs web bloquen els usuaris de Tor perquè no poden avaluar la diferència entre l'usuari Tor mitjà i el trànsit automatitzat. La millor manera que hem tingut per que els llocs desbloquin els usuaris de Tor és que els usuaris es posin en contacte directament amb els administradors del lloc. Alguna cosa així podria funcionar:

"Hola! He intentat accedir al vostre lloc xyz.com mentre feia servir el Navegador Tor i he descobert que no permet que els usuaris de Tor accedeixin al vostre lloc. Et convido a reconsiderar aquesta decisió; Tor és utilitzat per persones de tot el món per protegir la seva intimitat i lluitar contra la censura. Blocar els usuaris de Tor, probablement blocarà persones en països repressius que vulguin utilitzar una internet lliure, periodistes i investigadors que volen protegir-se de ser descoberts, denunciants, activistes i persones habituals que volen optar per un seguiment invasiu de tercers. Si us plau, prengui una posició forta a favor de la privadesa digital i la llibertat d'internet i permeti als usuaris de Tor accedir a xyz.com.Gràcies"

En el cas dels bancs i altres llocs web sensibles, també és habitual veure blocatge basat en la geografia (si un banc sap que en general accedeix als seus serveis d'un país i, de sobte, es connecta d'un repetidor de sortida a l'altre costat del món, el vostre compte pot estar blocat o suspès).

If you are unable to connect to an onion service, please see I cannot reach X.onion!.