Pertanyaan yang Sering Diajukan

Tor Browser mencegah orang lain mengetahui situs web yang Anda kunjungi. Beberapa entitas, seperti Internet Service Provider (ISP) And, dapat melihat bahwa Anda menggunakan Tor, tetapi mereka tidak akan tahu di mana Anda dan kapan Anda melakukannya.

Tor Browser dapat membantu dalam akses situs web Anda dari tempat yang terblokir. Umumnya hanya unduh Tor Browser dan gunakannya untuk membuka akses situs yang terblokir. Di tempat-tempat yang mengalami sensor berat, tersedia beberapa pilihan yang mengatasinya, termasuk pluggable transport..

Untuk info lebih lanjut, silakan baca bagian Tor Browser Manual di bagian censorship.

Sangat tidak dianjurkan untuk memasang add-on baru di Tor Browser karena mereka dapat membahayakan privasi dan keamanan Anda.

Installing new add-ons may affect Tor Browser in unforeseen ways and potentially make your Tor Browser fingerprint unique. If your copy of Tor Browser has a unique fingerprint, your browsing activities can be deanonymized and tracked even though you are using Tor Browser.

Basically, each browser's settings and features create what is called a "browser fingerprint". Most browsers inadvertently create a unique fingerprint for each user which can be tracked across the internet. Tor Browser is specifically engineered to have a nearly identical (we're not perfect!) fingerprint across it's users. This means each Tor Browser user looks like every other Tor Browser user, making it difficult to track any individual user.

There's also a good chance a new add-on will increase the attack surface of Tor Browser. This may allow sensitive data to be leaked or allow an attacker to infect Tor Browser. The add-on itself could even be maliciously designed to spy on you.

Tor Browser sudah terpasang dua add-on — HTTPS Everywhere dan NoScript — menambahkan add-on lain akan merusak anomimisitas Anda. </p>

Want to learn more about browser fingerprinting? Here's an article on The Tor Blog all about it!

Tor Browser is currently available on Windows, Linux and macOS.

There is a version of Tor Browser for Android and The Guardian Project also provides the app Orbot to route other apps on your Android device over the Tor network.

There is no official version of Tor for iOS yet, though we recommend Onion Browser.

Umumnya kami tidak menyarankan VPN dengan Tor kecuali Anda adalah pengguna tingkat lanjut yang dapat mengatur keduanya sehingga tidak mengurangi privasi Anda.

Silakan cari tahu lebih tentang menggabungkan Tor + VPN di wiki kami.</p>

About Tor

The name "Tor" can refer to several different components.

Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network.

The way most people use Tor is with Tor Browser, which is a version of Firefox that fixes many privacy issues. You can read more about Tor on our about page.

The Tor Project is a non-profit (charity) organization that maintains and develops the Tor software.

Because Tor is the onion routing network. When we were starting the new next-generation design and implementation of onion routing in 2001-2002, we would tell people we were working on onion routing, and they would say "Neat. Which one?" Even if onion routing has become a standard household term, Tor was born out of the actual onion routing project run by the Naval Research Lab.

(It's also got a fine translation from German and Turkish.)

Note: even though it originally came from an acronym, Tor is not spelled "TOR". Only the first letter is capitalized. In fact, we can usually spot people who haven't read any of our website (and have instead learned everything they know about Tor from news articles) by the fact that they spell it wrong.

A typical proxy provider sets up a server somewhere on the Internet and allows you to use it to relay your traffic. This creates a simple, easy to maintain architecture. The users all enter and leave through the same server. The provider may charge for use of the proxy, or fund their costs through advertisements on the server. In the simplest configuration, you don't have to install anything. You just have to point your browser at their proxy server. Simple proxy providers are fine solutions if you do not want protections for your privacy and anonymity online and you trust the provider to not do bad things. Some simple proxy providers use SSL to secure your connection to them, which protects you against local eavesdroppers, such as those at a cafe with free wifi Internet.

Simple proxy providers also create a single point of failure. The provider knows both who you are and what you browse on the Internet. They can see your traffic as it passes through their server. In some cases, they can even see inside your encrypted traffic as they relay it to your banking site or to ecommerce stores. You have to trust the provider isn't watching your traffic, injecting their own advertisements into your traffic stream, or recording your personal details.

Tor passes your traffic through at least 3 different servers before sending it on to the destination. Because there's a separate layer of encryption for each of the three relays, somebody watching your Internet connection can't modify, or read, what you are sending into the Tor network. Your traffic is encrypted between the Tor client (on your computer) and where it pops out somewhere else in the world.

Doesn't the first server see who I am?

Possibly. A bad first of three servers can see encrypted Tor traffic coming from your computer. It still doesn't know who you are and what you are doing over Tor. It merely sees "This IP address is using Tor". Tor is not illegal anywhere in the world, so using Tor by itself is fine. You are still protected from this node figuring out both who you are and where you are going on the Internet.

Can't the third server see my traffic?

Possibly. A bad third of three servers can see the traffic you sent into Tor. It won't know who sent this traffic. If you're using encryption (like HTTPS), it will only know the destination. See this visualization of Tor and HTTPS to understand how Tor and HTTPS interact.

There is absolutely no backdoor in Tor.

We know some smart lawyers who say that it's unlikely that anybody will try to make us add one in our jurisdiction (U.S.). If they do ask us, we will fight them, and (the lawyers say) probably win.

We will never put a backdoor in Tor. We think that putting a backdoor in Tor would be tremendously irresponsible to our users, and a bad precedent for security software in general. If we ever put a deliberate backdoor in our security software, it would ruin our professional reputations. Nobody would trust our software ever again - for excellent reason!

But that said, there are still plenty of subtle attacks people might try. Somebody might impersonate us, or break into our computers, or something like that. Tor is open source, and you should always check the source (or at least the diffs since the last release) for suspicious things. If we (or the distributors) don't give you source, that's a sure sign something funny might be going on. You should also check the PGP signatures on the releases, to make sure nobody messed with the distribution sites.

Also, there might be accidental bugs in Tor that could affect your anonymity. We periodically find and fix anonymity-related bugs, so make sure you keep your Tor versions up-to-date.

No, it doesn't. You need to use a separate program that understands your application and protocol and knows how to clean or "scrub" the data it sends. Tor Browser tries to keep application-level data, like the user-agent string, uniform for all users. Tor Browser can't do anything about text that you type into forms, though.

There are plenty of other programs you can use with Tor, but we haven't researched the application-level anonymity issues on all of them well enough to be able to recommend a safe configuration. Our wiki has a community-maintained list of instructions for Torifying specific applications. Please add to these lists and help us keep them accurate!

Most people use Tor Browser, which includes everything you need to browse the web safely using Tor. Using Tor with other browsers is dangerous and not recommended.

Yes.

The Tor software is free software. This means we give you the rights to redistribute the Tor software, either modified or unmodified, either for a fee or gratis. You don't have to ask us for specific permission.

However, if you want to redistribute the Tor software you must follow our LICENSE. Essentially this means that you need to include our LICENSE file along with whatever part of the Tor software you're distributing.

Most people who ask us this question don't want to distribute just the Tor software, though. They want to distribute the Tor Browser. This includes Firefox Extended Support Release, and the NoScript and HTTPS-Everywhere extensions. You will need to follow the license for those programs as well. Both of those Firefox extensions are distributed under the GNU General Public License, while Firefox ESR is released under the Mozilla Public License. The simplest way to obey their licenses is to include the source code for these programs everywhere you include the bundles themselves.

Also, you should make sure not to confuse your readers about what Tor is, who makes it, and what properties it provides (and doesn't provide). See our trademark FAQ for details.

Tor Browser

Digital signature is a process ensuring that a certain package was generated by its developers and has not been tampered with. Below we explain why it is important and how to verify that the Tor program you download is the one we have created and has not been modified by some attacker.

Each file on our download page is accompanied by a file with the same name as the package and the extension ".asc". These .asc files are OpenPGP signatures. They allow you to verify the file you've downloaded is exactly the one that we intended you to get. For example, torbrowser-install-win64-8.5.5_en-US.exe is accompanied by torbrowser-install-win64-8.5.5_en-US.exe.asc.

We now show how you can verify the downloaded file's digital signature on different operating systems. Please notice that a signature is dated the moment the package has been signed. Therefore every time a new file is uploaded a new signature is generated with a different date. As long as you have verified the signature you should not worry that the reported date may vary.

Installing GnuPG

First of all you need to have GnuPG installed before you can verify signatures.

For Windows users:

If you run Windows, download Gpg4win and run its installer.

In order to verify the signature you will need to type a few commands in windows command-line, cmd.exe.

For macOS users:

If you are using macOS, you can install GPGTools.

In order to verify the signature you will need to type a few commands in the Terminal (under "Applications").

For GNU/Linux users:

If you are using GNU/Linux, then you probably already have GnuPG in your system, as most GNU/Linux distributions come with it preinstalled.

In order to verify the signature you will need to type a few commands in a terminal window. How to do this will vary depending on your distribution.

Fetching the Tor Developers key

The Tor Browser team signs Tor Browser releases. Import the Tor Browser Developers signing key (0xEF6E286DDA85EA2A4BA7DE684E2C6E8793298290):

gpg --auto-key-locate nodefault,wkd --locate-keys torbrowser@torproject.org

This should show you something like:

gpg: key 4E2C6E8793298290: public key "Tor Browser Developers (signing key) <torbrowser@torproject.org>" imported
gpg: Total number processed: 1
gpg:               imported: 1
pub   rsa4096 2014-12-15 [C] [expires: 2020-08-24]
      EF6E286DDA85EA2A4BA7DE684E2C6E8793298290
uid           [ unknown] Tor Browser Developers (signing key) <torbrowser@torproject.org>
sub   rsa4096 2018-05-26 [S] [expires: 2020-09-12]

After importing the key, you can save it to a file (identifying it by fingerprint here):

gpg --output ./tor.keyring --export 0xEF6E286DDA85EA2A4BA7DE684E2C6E8793298290

Verifying the signature

To verify the signature of the package you downloaded, you will need to download the corresponding ".asc" signature file as well as the installer file itself, and verify it with a command that asks GnuPG to verify the file that you downloaded.

The examples below assume that you downloaded these two files to your "Downloads" folder.

The result of the command should produce something like this:

gpgv: Signature made 07/08/19 04:03:49 Pacific Daylight Time
gpgv:                using RSA key EB774491D9FF06E2
gpgv: Good signature from "Tor Browser Developers (signing key) <torbrowser@torproject.org>"

For Windows users:

gpgv --keyring .\tor.keyring Downloads\torbrowser-install-win64-8.5.5_en-US.exe.asc Downloads\torbrowser-install-win64-8.5.5_en-US.exe

For macOS users:

gpgv --keyring ./tor.keyring ~/Downloads/TorBrowser-8.5.5-osx64_en-US.dmg{.asc,}

For GNU/Linux users (change 64 to 32 if you have the 32-bit package):

gpgv --keyring ./tor.keyring ~/Downloads/tor-browser-linux64-8.5.5_en-US.tar.xz{.asc,}

You may also want to learn more about GnuPG.

Setiap kali kami merilis versi stabil baru Tor Browser, kami menulis posting blog yang merinci fitur-fiturnya yang baru dan masalah yang diketahui. Jika Anda mulai mengalami masalah dengan peramban Tor setelah update, silakan bacablog.torproject.org untuk posting tentang Tor Browser stable terkini dan lihat apakah masalah Anda sudah terdaftar. Jika masalah Anda tidak terdaftar, silahkan mengajukan laporan bug tentang apa yang Anda alami.

Perlindungan antivirus atau malware membuat pengguna membuat "daftar putih" terhadap proses tertentu yang normalnya diblokir. Silahkan buka perangkat lunak perlindungan antivirus atau malware Anda dan cari di dalam setting untuk "daftar putih" atau sesuatu yang serupa. Selanjutnya, kecualikan proses berikut:

  • Untuk Windows
    • firefox.exe
    • tor.exe
    • obfs4proxy.exe (jika Anda menggunakan bridge)
  • For macOS
    • TorBrowser
    • tor.real
    • obfs4proxy (jika Anda menggunakan bridge)

Akhirnya, restart Tor Browser. Ini seharusnya memperbaiki masalah yang Anda alami. Harap dicatat bahwa beberapa klien antivirus, seperti Kaspersky, juga dapat memblokir Tor di tingkat firewall.

File yang Anda download dan jalankan akan meminta Anda untuk sebuah destinasi. Jika Anda tidak ingat destinasi tersebut, itu adalah kemungkinan unduhan atau Desktop folder.

The default setting in the Windows installer also creates a shortcut for you on your Desktop, though be aware that you may have accidentally deselected the option to create a shortcut.

Jika Anda tidak dapat menemukannya di salah satu folder tersebut, download lagi dan cari prompt yang meminta Anda untuk memilih direktori untuk men-download itu. Pilih lokasi direktori yang Anda akan ingat dengan mudah, dan setelah download selesai Anda akan melihat folder Tor Browser yang ada.

Flash is disabled in Tor Browser, and we recommend you to not enable it. Kami tidak berpikir Flash aman untuk digunakan dalam browser apapun — ini adalah software yang sangat tidak aman yang dengan mudah dapat membahayakan privasi Anda atau memberikan malware kepada Anda. Untungnya, sebagian besar situs web, perangkat, dan peramban lain menjauh dari penggunaan Flash.

Hanya lalu lintas Tor Browser akan diarahkan melalui jaringan Tor. Aplikasi lain pada sistem Anda (termasuk browser lain) tidak akan diarahkan melalui jaringan Tor, dan akan tidak dilindungi. Mereka perlu secara terpisah dikonfigurasi untuk menggunakan Tor. Jika Anda perlu untuk memastikan bahwa semua lalu lintas akan masuk melalui jaringan Tor, lihatlah Tails live operating system yang dapat Anda gunakan di hampir semua komputer dengan menggunakan USB stick atau DVD.

Sangat tidak dianjurkan untuk memasang add-on baru di Tor Browser karena mereka dapat membahayakan privasi dan keamanan Anda.

Installing new add-ons may affect Tor Browser in unforeseen ways and potentially make your Tor Browser fingerprint unique. If your copy of Tor Browser has a unique fingerprint, your browsing activities can be deanonymized and tracked even though you are using Tor Browser.

Basically, each browser's settings and features create what is called a "browser fingerprint". Most browsers inadvertently create a unique fingerprint for each user which can be tracked across the internet. Tor Browser is specifically engineered to have a nearly identical (we're not perfect!) fingerprint across it's users. This means each Tor Browser user looks like every other Tor Browser user, making it difficult to track any individual user.

There's also a good chance a new add-on will increase the attack surface of Tor Browser. This may allow sensitive data to be leaked or allow an attacker to infect Tor Browser. The add-on itself could even be maliciously designed to spy on you.

Tor Browser sudah terpasang dua add-on — HTTPS Everywhere dan NoScript — menambahkan add-on lain akan merusak anomimisitas Anda. </p>

Want to learn more about browser fingerprinting? Here's an article on The Tor Blog all about it!

Sayangnya, kami belum memiliki versi Tor Browser untuk Chrome OS. You could run Tor Browser for Android on Chrome OS. Note that by using Tor Mobile on Chrome OS, you will view the mobile (not desktop) versions of websites. However, because we have not audited the app in Chrome OS, we don't know if all the privacy features of Tor Browser for Android will work well.

Memodifikasi cara Tor menciptakan sirkuit sangat tidak disarankan. Anda mendapatkan keamanan terbaik yang dapat diberikan Tor ketika Anda meninggalkan pilihan rute kepada Tor; mengubah node masuk/keluar dapat mengurangi anonimitas Anda. Jika hasil yang Anda inginkan adalah hanya untuk dapat mengakses sumber daya yang tersedia hanya di satu negara, Anda mungkin ingin mempertimbangkan menggunakan VPN daripada menggunakan Tor. Harap dicatat bahwa vpn tidak memiliki sifat privasi yang sama dengan Tor, tetapi mereka akan membantu memecahkan beberapa masalah pembatasan geolokasi.

Jika Anda menjalankan Tor Browser dan browser lain pada saat yang sama, tidak akan mempengaruhi kinerja atau privasi Tor. Namun, ketahuilah bahwa browser Anda yang lain tidak menjaga kerahasiaan aktivitas Anda, dan Anda mungkin lupa dan secara tidak sengaja menggunakan browser non-pribadi tersebut untuk melakukan sesuatu yang ingin Anda lakukan di Tor Browser.

Maaf, saat ini tidak ada dukungan resmi Tor Browser untuk *BSD. Ada proyek bernama TorBSD, tapi Tor Browser versi mereka tidak secara resmi didukung.

Anda mungkin pada jaringan disensor, sehingga Anda harus mencoba menggunakan bridge. Beberapa bridge dibuat untuk Tor Browser, dan Anda dapat menggunakannya dengan memilih "mengkonfigurasi" (kemudian mengikuti petunjuknya) di jendela Tor Launcher yang muncul ketika Anda membuka Tor Browser untuk pertama kalinya. Jika Anda memerlukan bridge lain, Anda dapat memperolehnya di situs web bridge kami. Untuk info lebih lanjut tentang bridge, silakan baca petunjuk Tor Browser.

Itu adalah perilaku normal Tor. Relay pertama di sirkuit Anda disebut "penjaga entri" atau "penjaga". Ini adalah relay yang sangat cepat dan stabil yang tetap menjadi relay yang pertama dalam sirkuit Anda selama 2-3 bulan untuk melindungi terhadap serangan perusak anonimitas yang dikenal. Sisa sirkuit Anda berubah untuk setiap website baru setiap Anda mengunjunginya, dan semua bersama-sama relay ini memberikan perlindungan privasi lengkap Tor. Untuk selengkapnya tentang cara relay penjaga bekerja, melihat ini posting blog dan kertas pada entri penjaga.

Salah satu masalah yang paling umum yang menyebabkan kesalahan koneksi di Tor Browser adalah jam sistem yang keliru. Silakan pastikan jam di sistem operasi dan zona waktu diatur dengan tepat di komputer Anda. Jika ini tidak memperbaiki masalah koneksi, lihat halaman Troubleshooting di [petunjuk Tor Browser(https://tb-manual.torproject.org/id/troubleshooting).

Klik tombol yang berlabel "Salin Tor Log ke Clipboard" yang muncul dalam jendela dialog ketika Tor Browser pertama kali terhubung ke jaringan. Jika Tor Browser sudah terbuka, klik pada ikon Torbutton (hijau bawang kecil di kiri atas layar), kemudian "Membuka pengaturan jaringan", kemudian "Salin Tor Log ke Clipboard". Setelah Anda telah menyalin log, Anda akan dapat menyalinya ke dalam teks editor atau email klien.

Tor Browser kadang-kadang lebih lambat dari peramban lain. Jaringan Tor memiliki lebih dari satu juta pengguna harian, dan lebih dari 6000 relay untuk merutekan semua lalu lintas mereka, dan beban pada setiap server kadang-kadang dapat menyebabkan latency. You can help improve the speed of the network by running your own relay, or encouraging others to do so. Walaupun begitu, Tor sekarang jauh lebih cepat daripada sebelumnya dan Anda mungkin tidak benar-benar melihat perubahan kecepatan dari peramban lain.

DuckDuckGoadalah mesin pencari utama di Tor Browser. DuckDuckGo tidak melacak penggunanya juga tidak menyimpan data tentang pencarian yang dilakukan pengguna. Pelajari lebih lanjut tentang kebijakan privasi DuckDuckGo.

Silakan lihat DuckDuckGo support portal. Jika Anda yakin ini adalah masalah Tor Browser, silakan melaporkannya kepada kami di pelacak bug.

Silakan lihat NoScript FAQ. Jika Anda yakin ini adalah masalah Tor Browser, silakan melaporkannya kepada kami di pelacak bug.

Silakan lihat HTTPS Everywhere. Jika Anda yakin ini adalah masalah Tor Browser, silakan melaporkannya kepada kami di pelacak bug.

Tor Browser memiliki dua cara untuk mengubah sirkuit relay Anda — "Identitas baru" dan "Tor sirkuit Baru untuk situs ini".

Kedua pilihan berada pada Menu, tetapi Anda juga bisa mengakses pilihan Sirkuit Baru di dalam menu informasi situs, pada kolom URL.

Identitas Baru

Pilihan ini berguna jika Anda ingin mencegah aktivitas browser Anda agar tidak terhubung dengan apa yang Anda lakukan sebelumnya.

Memilihnya akan menutup semua tab dan jendela yang terbuka, menghapus semua informasi pribadi seperti cookies dan riwayat penjelajahan, dan menggunakan sirkuit Tor baru untuk semua koneksi.

Browser Tor akan memperingatkan Anda bahwa semua aktivitas dan unduhan akan dihentikan, jadi pertimbangkanlah ini sebelum mengklik "New Identity".

Tor Browser Menu

Sirkuit Tor Baru untuk Situs ini

Pilihan ini berguna jika relay keluar tidak dapat terhubung ke situs web, atau situsnya tidak ditampilkan dengan benar. Memilihnya akan menyebabkan tab atau jendela yang aktif saat ini akan dimuat ulang melalui sebuah sirkuit Tor yang baru.

Tabs atau jendela lain yang sedang terbuka dari website yang sama akan menggunakan sirkuit yang baru demikian juga dengan yang sedang dijalankan.

Opsi ini tidak akan menghilangkan setiap infomasi pribadi atau tidak menghubungkan aktivitas anda, tidak juga berdampak pada koneksi anda saat ini pada website yang lain.

New Circuit for this Site

Tor Browser mencegah orang lain mengetahui situs web yang Anda kunjungi. Beberapa entitas, seperti Internet Service Provider (ISP) And, dapat melihat bahwa Anda menggunakan Tor, tetapi mereka tidak akan tahu di mana Anda dan kapan Anda melakukannya.

Tor Browser sering membuat koneksi Anda seakan-akan datang dari bagian dunia yang sama sekali berbeda. Sejumlah situs, seperti bank atau penyedia email mungkin saja mengartikan ini sebagai tanda bahwa akun Anda telah diretas atau terkompromikan dan mengkunci Anda dari layanan.

Satu-satunya cara untuk memecahkan masalah ini adalah dengan mematuhi prosedur yang direkomendasikan oleh situs yang dimaksud untuk menjalankan pemulihan akun atau menghubungi operator dan menjelaskan situasi Anda.

Anda mungkin mampu menghindari skenario ini jika penyedia layanan menawarkan 2-factor authentication, yang merupakan pilihan keamanan yang jauh lebih baik daripada reputasi berbasis IP. Hubungi penyedia layanan Anda dan tanya mereka jika mereka menyediakan 2FA.

Tor Browser is currently available on Windows, Linux and macOS.

There is a version of Tor Browser for Android and The Guardian Project also provides the app Orbot to route other apps on your Android device over the Tor network.

There is no official version of Tor for iOS yet, though we recommend Onion Browser.

Saat ini ada tidak ada metode yang didukung untuk menetapkan Tor Browser sebagai penjelajah standar. Tor Browser bekerja keras untuk mengisolasi diri dari seluruh sistem Anda, dan langkah-langkah untuk membuat default browser tidak dapat diandalkan. Ini berarti kadang-kadang situs web akan memuat di dalam Tor Browser, dan kadang-kadang itu akan dimuat dalam browser lain, jenis perilaku ini dapat berbahaya dan merusak anonimitas.

Menjalankan Tor Browser tidak membuat Anda bertindak sebagai relay dalam jaringan. Ini berarti bahwa komputer Anda tidak akan digunakan untuk merutekan lalu lintas untuk orang lain. Jika Anda ingin menjadi sebuah relay, silakan lihat panduan Tor Relay .

Kami mengonfigurasi NoScript untuk mengizinkan JavaScript secara default di Tor Browser karena banyak situs web tidak akan berfungsi dengan JavaScript dinonaktifkan. Sebagian besar pengguna akan meninggalkan Tor jika JavaScript dimatikan secara default karena akan menyebabkan banyak masalah bagi mereka. Pada akhirnya, kami ingin membuat Tor Browser seaman mungkin sementara juga membuat bermanfaat bagi sebagian orang, jadi untuk sekarang, ini berarti membuat JavaScript diaktifkan secara default.

Untuk pengguna yang ingin memiliki JavaScript dinonaktifkan pada semua situs HTTP secara default, sebaiknya mengubah slider keamanan Tor Browser (di menu Tor Browser bawang di bawah "Pengaturan keamanan"). The standard level allows JavaScript, but the safer and safest levels both block JavaScript on HTTP sites.

Sayangnya, beberapa situs web memberikan CAPTCHA kepada pengguna Tor, dan kami tidak dapat menghilangkan CAPTCHA tersebut. Hal terbaik untuk dilakukan dalam kasus ini adalah untuk menghubungi pemilik situs, dan memberitahu mereka bahwa mereka captcha mencegah pengguna seperti Anda dari menggunakan jasa mereka.

Kami tidak merekomendasikan menjalankan beberapa Tor browser secara bersamaan, dan ini mungkin tidak bekerja seperti yang diantisipasi pada banyak platform.

We want everyone to be able to enjoy Tor Browser in their own language. Tor Browser is now available in 25 different languages, and we are working to add more. Want to help us translate? See here

You can also help us testing the next languages we will release, by installing and testing Tor Browser Alpha releases.

Saat menggunakan Tor Browser, tidak ada yang bisa melihat situs web yang Anda kunjungi. Namun, penyedia layanan atau admin jaringan Anda mungkin dapat melihat bahwa Anda tersambung ke jaringan Tor, meskipun mereka tidak akan tahu apa yang Anda lakukan ketika Anda menggunakannya.

Kadang-kadang website yang banyak menggunakan JavaScript dapat memiliki masalah fungsional di Tor Browser. Solusi paling sederhana adalah klik pada "onion menu," kemudian klik pada keamanan slider. Atur keamanan Anda ke "Standar".

Tor Browser adalah versi modifikasi dari Firefox yang khusus dirancang untuk digunakan dengan Tor. Banyak pekerjaan telah dimasukkan ke dalam membuat Tor Browser, termasuk penggunaan tambahan patch untuk meningkatkan privasi dan keamanan. Meskipun secara teknis mungkin menggunakan Tor dengan browser lain, Anda dapat membuka diri terhadap serangan potensial atau kebocoran informasi, sehingga kami sangat melarang itu. Pelajari lebih lanjut tentang desain Tor Browser .

Dengan rilis dari Tor Browser 6.0.6, kami beralih ke DuckDuckGo sebagai mesin pencari utama. Untuk sekarang, Disconnect tidak punya akses ke hasil pencarian Google yang kita gunakan dalam Tor Browser. Karena Disconnect adalah sebuah mesin pencari meta yang memungkinkan pengguna untuk memilih antara penyedia layanan pencarian yang berbeda, menggunakan Bing, yang memberikan hasil pencarian yang tidak dapat diterima pada kualitasnya.

Tor Browser dibangun menggunakan Firefox ESR, sehingga kelemahan Firefox dapat terjadi di Tor Browser. Pastikan tidak ada Tor browser lain sedang berjalan, dan bahwa Anda telah mengekstrak Tor Browser di lokasi yang pengguna memiliki izin yang sesuai. Jika Anda menjalankan anti virus, silakan lihat perlindungan antivirus malware yang menghalangi saya mengakses Tor Browser, itu biasa kalau antivirus/anti-malware menyebabkan jenis masalah ini.

Anda bisa menggunakan browser lain saat Anda juga menggunakan Tor Browser. Namun, Anda harus tahu bahwa fitur privasi Tor Browser tidak akan hadir di dalam browser lainnya. Hati-hati ketika beralih bolak-balik antara Tor dan browser yang kurang aman, karena Anda mungkin secara tidak sengaja menggunakan browser lain untuk sesuatu yang Anda dimaksudkan untuk Tor.

Sayangnya, tidak ada cara didukung untuk membuat Tor Browser menjadi peramban default Anda.

Kadang beberapa situs web memblokir pengguna Tor karena tidak dapat membedakan pengguna Tor biasa dan lalu-lintas otomatis. Hal terbaik yang dapat dilakukan adalah pengguna menghubungi langsung admin situsnya. Ini mungkin dapat menjadi contoh:

Halo! Saya berusaha melakukan akses terhadap situs xyz.com Anda melalui Tor Browser dan ternyata Anda tidak mengizinkan pengguna Tor untuk melakukan akses terhadap situs Anda. Saya mohon dengan sangat untuk mempertimbangkan hal ini; Tor digunakan orang-orang di seluruh dunia untuk melindungi privasi mereka dan melawan sensor. Dengan memblokir pengguna Tor, Anda akan memblokir orang-orang di negara-negara represif yang ingin menggunakan Internet secara bebas, wartawan, dan peneliti yang ingin melindungi diri sendiri dari penemuan, termasuk whistleblower, aktivis, dan orang-orang biasa yang ingin terbebas dari pelacakan menyeluruh yang dilakukan pihak lain. Mohon dukungan penuh terhadap privasi digital dan kebebasan Internet, dan izinkan pengguna Tor untuk melakukan akses ke xyz.com. Terima kasih!

Untuk situs web perbankan dan situs web lain yang sensitif, umumnya ada pemblokiran berdasarkan wilayah geografis (jika bank Anda mengetahui Anda biasanya melakukan akses terhadap jasa mereka dari suatu negara dan jika tiba-tiba Anda membuka situs web mereka dari exit relay di negara lain, akun Anda mungkin akan dikunci atau dibekukan).

Jika Anda tidak dapat terhubung ke sebuah onion service, silakan lihat Saya tidak dapat menghubungi X.onion!

Tor Browser dapat membantu dalam akses situs web Anda dari tempat yang terblokir. Umumnya hanya unduh Tor Browser dan gunakannya untuk membuka akses situs yang terblokir. Di tempat-tempat yang mengalami sensor berat, tersedia beberapa pilihan yang mengatasinya, termasuk pluggable transport..

Untuk info lebih lanjut, silakan baca bagian Tor Browser Manual di bagian censorship.

Kami sangat menyarankan untuk tidak menggunakan Tor di browser apapun selain Tor Browser. Menggunakan Tor di browser lain dapat membuat Anda rentan tanpa perlindungan privasi browser Tor.

While the names may imply otherwise, 'Incognito mode' and 'private tabs' do not make you anonymous on the Internet. They erase all the information on your machine relating to the browsing session after they are closed, but have no measures in place to hide your activity or digital fingerprint online. This means that an observer can collect your traffic just as easily as any regular browser.

Tor Browser offers all the amnesic features of private tabs while also hiding the source IP, browsing habits and details about a device that can be used to fingerprint activity across the web, allowing for a truly private browsing session that's fully obfuscated from end-to-end.

For more information regarding the limitations of Incognito mode and private tabs, see Mozilla's article on Common Myths about Private Browsing.

WARNING: Do NOT follow random advice instructing you to edit your torrc! Doing so can allow an attacker to compromise your security and anonymity through malicious configuration of your torrc.

Tor uses a text file called torrc that contains configuration instructions for how Tor should behave. The default configuration should work fine for most Tor users (hence the warning above.)

To find your Tor Browser torrc, follow the instructions for your operating system below.

On Windows or Linux:

  • The torrc is in the Tor Browser Data directory at Browser/TorBrowser/Data/Tor inside your Tor Browser directory.

On macOS:

  • The torrc is in the Tor Browser Data directory at ~/Library/Application Support/TorBrowser-Data/Tor.
  • Note the Library folder is hidden on newer versions of macOS. To navigate to this folder in Finder, select "Go to Folder..." in the "Go" menu.

Go to folder menu option.

  • Then type "~/Library/Application Support/" in the window and click Go.

Go to folder window.

Close Tor Browser before you edit your torrc, otherwise Tor Browser may erase your modifications. Some options will have no effect as Tor Browser overrides them with command line options when it starts Tor.

Have a look at the sample torrc file for hints on common configurations. For other configuration options you can use, see the Tor manual page. Remember, all lines beginning with # in torrc are treated as comments and have no effect on Tor's configuration.

Tor Messenger

Tidak. Setelah sebelas rilis beta, kami menghentikan dukungan Tor Messenger. Kita masih bisa percaya kemampuan Tor untuk digunakan dalam aplikasi pesan, tapi kita tidak memiliki sumber daya untuk membuat hal itu terjadi sekarang. Do you? Contact us.

Tor Mobile

Yes, there is a version of Tor Browser available specifically for Android. Installing Tor Browser for Android is all you need to run Tor on your Android device.

The Guardian Project provides the app Orbot which can be used to route other apps on your Android device over the Tor network, however only Tor Browser for Android is needed to browse the web with Tor.

The Guardian Project maintains Orbot (and other privacy applications) on Android. More info can be found on the Guardian Project's website.

Kami merekomendasikan aplikasi IOS bernama Onion Browser, yang berlisensi open source, yang menggunakan jaringan Tor, dan dikembangkan oleh pihak yang bekerja-sama secara dekat dengan Tor Project. Namun, Apple mengharuskan peramban di IOS untuk menggunakan Webkit, yang menghalangi Onion Browser memiliki tingkat pelrindungan privasi yang sama dengan Tor Browser.

Learn more about Onion Browser. Download Onion Browser from the App Store.

Saat ini ada tidak ada metode yang didukung untuk menjalankan Tor pada Windows Phone.

While both Tor Browser for Android and Orbot are great, they serve different purposes. Tor Browser for Android is like the desktop Tor Browser, but on your mobile device. It is a one stop browser that uses the Tor network and tries to be as anonymous as possible. Orbot on the other hand is a proxy that will enable you to send the data from your other applications (E-Mail clients, instant messaging apps, etc.) through the tor network; a version of Orbot is also inside of the Tor Browser for Android, and is what enables it to connect to the Tor network. That version, however, does not enable you to send other apps outside of the Tor Browser for Android through it. Depending on how you want to use the tor network, either one or both of these could be a great option.

It will be, soon. In the meantime you can use F-Droid to download Tor Browser for Android by enabling the Guardian Project's Repository.

Learn how to add a repository to F-Droid.

GetTor

If you can't download Tor Browser through our website, you can get a copy of Tor Browser delivered to you via GetTor. GetTor adalah service yang yang otomatis merespon pesan berisi tautan ke versi terakhir Tor Browser, yang dihosting di lokasi beragam sehingga kemungkinan kecil disensor, seperti Dropbox, Google Drive, dan GitHub. You can also download Tor Browser from https://tor.eff.org or from https://tor.ccc.de. For more geographically specific links visit Tor: Mirrors

Kirim email ke gettor@torproject.org. Tulis sistem operasi Anda (seperti windows, macOS atau linux) dalam tubuh pesan. GetTor akan merespon dengan email yang memuat tautan dari sumber pengunduh paket Tor Browser, tanda tangan kriptografi (diperlukan untuk memverikasi unduhan), sidik jari pengguna utama yang akan digunakan untuk membuat tanda tangan, dan paket checksum. Anda mungkin akan ditawari pilihan perangkat lunak "32-bit" atau "64-bit": hal ini tergantung pada model komputer yang Anda gunakan; Baca dokumentasi mengenai komputer Anda untuk mengetahui lebih lanjut.

GetTor via Twitter is currently under maintenance. Please use the email instead.

Untuk mendapatkan tautan untuk mengunduh Tor Browser, kirim pesan ke gettor@torproject.org dengan salah satu kode berikut di dalamnya:

  • Linux
  • macOS (OS X)
  • Windows

Terhubung ke Tor

Salah satu masalah yang paling umum yang menyebabkan kesalahan koneksi di Tor Browser adalah jam sistem yang keliru. Silakan pastikan jam di sistem operasi dan zona waktu diatur dengan tepat di komputer Anda. Jika ini tidak memperbaiki masalah koneksi, lihat halaman Troubleshooting di [petunjuk Tor Browser(https://tb-manual.torproject.org/id/troubleshooting).

Jika Anda mendapat masalah dalam terhubung ke Jaringan Tor, silakan pilih "copy Tor Log ke clipboard." Lalu, salin ke Notepad atau program dokumen lain. Anda seharusnya melihat salah satu kesalahan log umum ini (cari baris berikut di log Tor Anda):

Common log error #1: Proxy connection failure
2017-10-29 09:23:40.800 [NOTICE] Opening Socks listener on 127.0.0.1:9150 
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 5%: Connecting to directory server 
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server 
2017-10-29 09:24:08.900 [WARN] Proxy Client: unable to connect to xx..xxx..xxx.xx:xxxxx ("general SOCKS server failure") 

Jika Anda melihat baris seperti ini, Tor gagal tersambung ke SOCKS proxy. Jika proxy SOCKS diperlukan di pengaturan jaringan Anda, silakan pastikan Anda telah memasukkan detail proxy dengan akurat. Jika proxy SOCKS tidak diperlukan, atau Anda tidak yakin bahwa proxy SOCKS diperlukan, silakan coba tanpa proxy SOCKS

Common log error #2: Can’t reach guard relays
11/1/2017 21:11:43 PM.500 [NOTICE] Opening Socks listener on 127.0.0.1:9150 
11/1/2017 21:11:44 PM.300 [NOTICE] Bootstrapped 80%: Connecting to the Jaringan Tor 
11/1/2017 21:11:44 PM.300 [WARN] Failed to find node for hop 0 of our path.  Discarding this circuit. 
11/1/2017 21:11:44 PM.500 [NOTICE] Bootstrapped 85%: Finishing handshake with first hop 
11/1/2017 21:11:45 PM.300 [WARN] Failed to find node for hop 0 of our path.  Discarding this circuit. 

Jika Anda melihat baris seperti ini di Tor log, Tor gagal tersambung ke node pertama di Tor circuit. Ini mungkin artinya Anda berada di jaringan yang terkena sensor pihak lain.

Mohon coba lagi dengan menggunakan bridge, ini seharusnya menyelesaikan masalah ini.

Common log error #3: Failed to complete TLS handshake
13-11-17 19:52:24.300 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server  
13-11-17 19:53:49.300 [WARN] Problem bootstrapping.  Stuck at 10%: Finishing handshake with directory server.  (DONE; DONE; count 10; recommendation warn; host [host] at xxx.xxx.xxx.xx:xxx)  
13-11-17 19:53:49.300 [WARN] 10 connections have failed:  
13-11-17 19:53:49.300 [WARN]  9 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE  
13-11-17 19:53:49.300 [WARN]  1 connections died in state connect()ing with SSL state (No SSL object)

If you see lines like this in your Tor log, it means that Tor failed to complete a TLS handshake with the directory authorities. Menggunakan bridges mungkin akan memperbaiki ini.

Common log error #4: Clock skew
19.11.2017 00:04:47.400 [NOTICE] Opening Socks listener on 127.0.0.1:9150 
19.11.2017 00:04:48.000 [NOTICE] Bootstrapped 5%: Connecting to directory server  
19.11.2017 00:04:48.200 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server  
19.11.2017 00:04:48.800 [WARN] Received NETINFO cell with skewed time (OR:xxx.xx.x.xx:xxxx): It seems that our clock is behind by 1 days, 0 hours, 1 minutes, or that theirs is ahead. Tor requires an accurate clock to work: please check your time, timezone, and date settings.

Jika Anda melihat baris seperti ini di log Tor Anda, itu berarti jam sistem Anda tidak benar. Pastikan jam Anda diatur secara akurat, termasuk sedangkan benar. Kemudian restart Tor.

If you cannot reach the onion service you desire, make sure that you have entered the 16-character or, the newest format, 56-character onion address correctly: even a small mistake will stop Tor Browser from being able to reach the site. Bila anda tetap tidak dapat terhubung ke layanan onion, mohon coba kembali. Mungkin ada persoalan koneksi, atau operator situs membuatnya "offline" tanpa peringatan.

Anda juga bisa memastikan bahwa Anda dapat mengakes layanan onion lain dengan tersambung ke DuckDuckGo's Onion Service

Sensor

Tor Browser dapat membantu dalam akses situs web Anda dari tempat yang terblokir. Umumnya hanya unduh Tor Browser dan gunakannya untuk membuka akses situs yang terblokir. Di tempat-tempat yang mengalami sensor berat, tersedia beberapa pilihan yang mengatasinya, termasuk pluggable transport..

Untuk info lebih lanjut, silakan baca bagian Tor Browser Manual di bagian censorship.

Kadang beberapa situs web memblokir pengguna Tor karena tidak dapat membedakan pengguna Tor biasa dan lalu-lintas otomatis. Hal terbaik yang dapat dilakukan adalah pengguna menghubungi langsung admin situsnya. Ini mungkin dapat menjadi contoh:

Halo! Saya berusaha melakukan akses terhadap situs xyz.com Anda melalui Tor Browser dan ternyata Anda tidak mengizinkan pengguna Tor untuk melakukan akses terhadap situs Anda. Saya mohon dengan sangat untuk mempertimbangkan hal ini; Tor digunakan orang-orang di seluruh dunia untuk melindungi privasi mereka dan melawan sensor. Dengan memblokir pengguna Tor, Anda akan memblokir orang-orang di negara-negara represif yang ingin menggunakan Internet secara bebas, wartawan, dan peneliti yang ingin melindungi diri sendiri dari penemuan, termasuk whistleblower, aktivis, dan orang-orang biasa yang ingin terbebas dari pelacakan menyeluruh yang dilakukan pihak lain. Mohon dukungan penuh terhadap privasi digital dan kebebasan Internet, dan izinkan pengguna Tor untuk melakukan akses ke xyz.com. Terima kasih!

Untuk situs web perbankan dan situs web lain yang sensitif, umumnya ada pemblokiran berdasarkan wilayah geografis (jika bank Anda mengetahui Anda biasanya melakukan akses terhadap jasa mereka dari suatu negara dan jika tiba-tiba Anda membuka situs web mereka dari exit relay di negara lain, akun Anda mungkin akan dikunci atau dibekukan).

Jika Anda tidak dapat terhubung ke sebuah onion service, silakan lihat Saya tidak dapat menghubungi X.onion!

If you can't download Tor Browser through our website, you can get a copy of Tor Browser delivered to you via GetTor. GetTor adalah service yang yang otomatis merespon pesan berisi tautan ke versi terakhir Tor Browser, yang dihosting di lokasi beragam sehingga kemungkinan kecil disensor, seperti Dropbox, Google Drive, dan GitHub. You can also download Tor Browser from https://tor.eff.org or from https://tor.ccc.de. For more geographically specific links visit Tor: Mirrors

Anda mungkin pada jaringan disensor, sehingga Anda harus mencoba menggunakan bridge. Beberapa bridge dibuat untuk Tor Browser, dan Anda dapat menggunakannya dengan memilih "mengkonfigurasi" (kemudian mengikuti petunjuknya) di jendela Tor Launcher yang muncul ketika Anda membuka Tor Browser untuk pertama kalinya. Jika Anda memerlukan bridge lain, Anda dapat memperolehnya di situs web bridge kami. Untuk info lebih lanjut tentang bridge, silakan baca petunjuk Tor Browser.

Jika Anda mendapat masalah dalam terhubung ke Jaringan Tor, silakan pilih "copy Tor Log ke clipboard." Lalu, salin ke Notepad atau program dokumen lain. Anda seharusnya melihat salah satu kesalahan log umum ini (cari baris berikut di log Tor Anda):

Common log error #1: Proxy connection failure
2017-10-29 09:23:40.800 [NOTICE] Opening Socks listener on 127.0.0.1:9150 
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 5%: Connecting to directory server 
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server 
2017-10-29 09:24:08.900 [WARN] Proxy Client: unable to connect to xx..xxx..xxx.xx:xxxxx ("general SOCKS server failure") 

Jika Anda melihat baris seperti ini, Tor gagal tersambung ke SOCKS proxy. Jika proxy SOCKS diperlukan di pengaturan jaringan Anda, silakan pastikan Anda telah memasukkan detail proxy dengan akurat. Jika proxy SOCKS tidak diperlukan, atau Anda tidak yakin bahwa proxy SOCKS diperlukan, silakan coba tanpa proxy SOCKS

Common log error #2: Can’t reach guard relays
11/1/2017 21:11:43 PM.500 [NOTICE] Opening Socks listener on 127.0.0.1:9150 
11/1/2017 21:11:44 PM.300 [NOTICE] Bootstrapped 80%: Connecting to the Jaringan Tor 
11/1/2017 21:11:44 PM.300 [WARN] Failed to find node for hop 0 of our path.  Discarding this circuit. 
11/1/2017 21:11:44 PM.500 [NOTICE] Bootstrapped 85%: Finishing handshake with first hop 
11/1/2017 21:11:45 PM.300 [WARN] Failed to find node for hop 0 of our path.  Discarding this circuit. 

Jika Anda melihat baris seperti ini di Tor log, Tor gagal tersambung ke node pertama di Tor circuit. Ini mungkin artinya Anda berada di jaringan yang terkena sensor pihak lain.

Mohon coba lagi dengan menggunakan bridge, ini seharusnya menyelesaikan masalah ini.

Common log error #3: Failed to complete TLS handshake
13-11-17 19:52:24.300 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server  
13-11-17 19:53:49.300 [WARN] Problem bootstrapping.  Stuck at 10%: Finishing handshake with directory server.  (DONE; DONE; count 10; recommendation warn; host [host] at xxx.xxx.xxx.xx:xxx)  
13-11-17 19:53:49.300 [WARN] 10 connections have failed:  
13-11-17 19:53:49.300 [WARN]  9 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE  
13-11-17 19:53:49.300 [WARN]  1 connections died in state connect()ing with SSL state (No SSL object)

If you see lines like this in your Tor log, it means that Tor failed to complete a TLS handshake with the directory authorities. Menggunakan bridges mungkin akan memperbaiki ini.

Common log error #4: Clock skew
19.11.2017 00:04:47.400 [NOTICE] Opening Socks listener on 127.0.0.1:9150 
19.11.2017 00:04:48.000 [NOTICE] Bootstrapped 5%: Connecting to directory server  
19.11.2017 00:04:48.200 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server  
19.11.2017 00:04:48.800 [WARN] Received NETINFO cell with skewed time (OR:xxx.xx.x.xx:xxxx): It seems that our clock is behind by 1 days, 0 hours, 1 minutes, or that theirs is ahead. Tor requires an accurate clock to work: please check your time, timezone, and date settings.

Jika Anda melihat baris seperti ini di log Tor Anda, itu berarti jam sistem Anda tidak benar. Pastikan jam Anda diatur secara akurat, termasuk sedangkan benar. Kemudian restart Tor.

Jembatan relay adalah Tor relay yang tidak tercantum dalam direktori Tor publik. Itu berarti bahwa ISP atau pemerintah yang berusaha untuk memblokir akses ke jaringan Tor tidak dapat memblokir semua jembatan. Jembatan berguna bagi pengguna Tor di bawah rezim yang menindas, dan bagi orang-orang yang menginginkan lapisan keamanan tambahan karena mereka khawatir seseorang akan mengenali bahwa saat mereka menghubungi alamat IP relay Tor publik.

Jembatan adalah hanya sebuah relay normal dengan konfigurasi yang sedikit berbeda. See How do I run a bridge for instructions.

Beberapa negara, termasuk Tiongkok dan Iran, telah menemukan cara untuk mendeteksi dan memblokir koneksi ke jembatan Tor. Obfsproxy Jembatan mengatasi ini dengan menambahkan lapisan obfuscation. Mengkonfigurasi sebuah jembatan obfsproxy memerlukan paket software dan konfigurasi tambahan. Lihat halaman transportasi pluggable untuk info lebih lanjut.

HTTPS

Tor mencegah penyadap dari mengetahui situs yang Anda kunjungi. Namun, informasi yang dikirim tidak terenkripsi melalui internet dengan menggunakan HTTP polos masih dapat dicegat oleh operator relay keluar atau orang yang mengamati lalu lintas antara relay keluar dan situs tujuan Anda. Jika situs yang Anda kunjungi menggunakan HTTPS, lalu lintas yang meninggalkan relay keluar akan dienkripsi, dan tidak akan terlihat oleh penyadap.

https

If you are using HTTPS, your website URL will begin with "https://".

This visualization shows what information is visible to eavesdroppers with and without Tor Browser and HTTPS encryption.

The following visualization shows what information is visible to eavesdroppers with and without Tor Browser and HTTPS encryption:

  • Click the “Tor” button to see what data is visible to observers when you're using Tor. The button will turn green to indicate that Tor is on.
  • Click the “HTTPS” button to see what data is visible to observers when you're using HTTPS. The button will turn green to indicate that HTTPS is on.
  • When both buttons are green, you see the data that is visible to observers when you are using both tools.
  • When both buttons are grey, you see the data that is visible to observers when you don't use either tool.



POTENTIALLY VISIBLE DATA
Site.com
The site being visited.
user / pw
Username and password used for authentication.
data
Data being transmitted.
location
Network location of the computer used to visit the website (the public IP address).
Tor
Whether or not Tor is being used.

The short answer is: Yes, you can browse normal HTTPS Sites using Tor.

HTTPS Connections are used to secure communications over computer networks. You can read more about HTTPS here Tor Browser has the HTTPS Everywhere plugin which automatically switches thousands of sites from unencrypted "HTTP" to more private "HTTPS".

Operator

  • Jangan gunakan paket di repositori Ubuntu. Mereka tidak dapat diperbarui secara andal. Jika Anda menggunakannya, Anda akan kehilangan perbaikan stabilitas dan keamanan yang penting.
  • Cari versi Ubuntu Anda dengan menjalankan perintah berikut:
     $ lsb_release -c
    
  • As root, add the following lines to /etc/apt/sources.list. Replace 'version' with the version you found in the previous step:
     $ deb https://deb.torproject.org/torproject.org version main
     $ deb-src https://deb.torproject.org/torproject.org version main
    
  • Tambahkan kunci gpg untuk menandatangani paket dengan menjalankan perintah berikut:
     $ curl https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | sudo apt-key add -
    
  • Jalankan perintah berikut untuk memasang tor dan memeriksa tanda tangannya:
     $ sudo apt-get update 
     $ sudo apt-get install tor deb.torproject.org-keyring 
    

Tidak. Jika penegakan hukum menjadi tertarik pada lalu lintas dari relay keluar Anda, sangat mungkin bahwa petugas akan merebut komputer Anda. Untuk alasan itu, lebih baik tidak untuk menjalankan relay keluar di rumah Anda atau menggunakan koneksi internet rumah.

Sebaliknya, mempertimbangkan menjalankan relay keluar Anda dalam fasilitas komersial yang mendukung Tor. Miliki alamat IP terpisah untuk relay keluar Anda, dan jangan merutekan lintas Anda sendiri lalu melalui IP itu. Tentu saja, Anda harus menghindari menyimpan informasi sensitif atau pribadi apa pun pada komputer yang menghosting relay keluar Anda.

Layanan Onion

Situs-situs yang hanya dapat diakses melalui Tor disebut "onion" dan berakhir dengan akhiran .onion. Contohnya, situs onion dari DuckDuckGo adalah https://3g2upl4pq6kufc4m.onion. Anda dapat mengakses situs-situs tersebut dengan menggunakan Tor Browser. Alamat situsnya harus diberikan oleh pemiliknya karena tidak terindeks oleh mesin pencari seperti situs biasa.

Onion service memungkinkan orang untuk melihat, tetapi juga untuk mempublikasikan secara anonim, termasuk penerbitan website anonim.

Layanan Onion juga diandalkan untuk layanan percakapan dan berbagi berkas bebas-metadata, interaksi yang aman antar jurnalis dengan sumber-sumbernya seperti dengan SecureDropatauOnionShare, pembaruan perangkat lunak yang lebih aman, dan cara yang lebih aman untuk mencapai situs web populer seperti Facebook.

These services use the special-use top level domain (TLD) .onion (instead of .com, .net, .org, etc..) and are only accessible through the Tor network.

Saat mengakses sebuah situs web yang menggunakan layanan onion, Tor Browser akan menunjukkan pada kolom URL sebuah ikon onion kecil berwarna hijau yang menampilkan keadaan koneksi anda: aman dan menggunakan sebiuah layanan onion.

Onion icon

And if you're accessing a website with HTTPS and onion service, it will show an icon of a green onion and a padlock.

Green onion with a padlock

If you cannot reach the onion service you desire, make sure that you have entered the 16-character or, the newest format, 56-character onion address correctly: even a small mistake will stop Tor Browser from being able to reach the site. Bila anda tetap tidak dapat terhubung ke layanan onion, mohon coba kembali. Mungkin ada persoalan koneksi, atau operator situs membuatnya "offline" tanpa peringatan.

Anda juga bisa memastikan bahwa Anda dapat mengakes layanan onion lain dengan tersambung ke DuckDuckGo's Onion Service

When browsing an Onion Service, Tor Browser displays different onion icons in the address bar indicating the security of the current webpage.

Image of a green onion A green onion means:

  • The Onion Service is served over HTTP, or HTTPS with a self-signed certificate.

Image of a green onion with a lock A green onion with a lock means:

  • The Onion Service is served over HTTPS with a CA-Issued certificate.

Image of a grey onion with a red slash A grey onion with a red slash means:

  • The Onion Service is served over HTTPS with a self-signed or CA-Issued certificate.
  • The webpage contains subresources served over HTTP.

Lain-lain

Tor mengandalkan dukungan dari pengguna dan sukarelawan di seluruh dunia untuk membantu meningkatkan perangkat lunak dan sumber daya kami, jadi umpan balik Anda sangat berharga untuk kami (dan untuk semua pengguna Tor).

Feedback template

When sending us feedback or reporting a bug, please include as many of these as possible:

  • OS you are using
  • Tor Browser version
  • Step by step of how you got to the issue, so we can reproduce it (e.g. I opened the browser, typed a url, clicked on (i) icon, then my browser crashed)
  • A screenshot of the problem
  • The log

How to Reach Us

There are several ways to reach us, so please use what works best for you.

Trac

You can file a ticket at https://trac.torproject.org. We track all Tor Browser 8 related issues with the ff60-esr keyword. Tickets related to our website should be added with the component "Webpages/Website."

Email

Send us an email at frontdesk at torproject.org

In the subject line of your email, please tell us what you're reporting. The more objective your subject line is (e.g. "Connection failure", "feedback on website", "feedback on Tor Browser, "I need a bridge"), the easier it will be for us to understand and follow up. Sometimes when we receive emails without subject lines, they're marked as spam and we don't see them.

For the fastest response, please write in English, Spanish, and/or Portuguese if you can. If none of these languages works for you, please write on any language you feel comfortable with, but keep in mind it will take us a bit longer to answer as we will need help with translation to understand it.

Blog post comments

You can always leave comments on the blog post related to the issue or feedback you want to report. If there is not a blog post related to your issue, please contact us another way.

IRC

You can find us in the #tor channel on OFTC to give us feedback or report bugs/issues. We may not respond right away, but we do check the backlog and will get back to you when we can.

Learn how to connect to OFTC servers.

Email Lists

For reporting issues or feedback using email lists, we recommend that you do on the one that is related to what you would like to report.

For feedback or issues related to Tor Browser use: tbb-bugs

For feedback or issues related to our websites, please use: ux

For feedback or issues related to Tor network or other projects developed by Tor please use: tor-dev

For feedback or issues related to running a Tor relay please use: tor-relays

For feedback on content related to Tor Browser Manual or Support website: tor-community-team

The community team has developed this Glossary of terms about and related to Tor

A

add-on, extension, or plugin

Add-ons, extensions, and plugins are components that can be added to web browsers to give them new features. Tor Browser comes with two add-ons installed: NoScript and HTTPS Everywhere. You should not install any additional add-ons to Tor Browser because that can compromise some of its privacy features.

antivirus software

An antivirus software is used to prevent, detect and remove malicious software. Antivirus software can interfere with Tor running on your computer. You may need to consult the documentation for your antivirus software if you do not know how to allow Tor.

App

A web application (web app), is an application which the client runs in a web browser. App can also refer to software that you install on mobile operating systems.

Atlas

Atlas is a web application to learn about currently running Tor relays.

B

bandwidth authority

To determine a relay's throughput, special relays called bandwidth authorities take periodic measurements of the relays in the consensus.

jembatan

Like ordinary Tor relays, bridges are run by volunteers; unlike ordinary relays, however, they are not listed publicly, so an adversary cannot identify them easily. Pluggable transports are a type of bridge that help disguise the fact that you are using Tor.

bridge authority

A special-purpose relay that maintains the list of bridges.

browser fingerprinting

Fingerprinting is the process of collecting information about a device or service to make educated guesses about its identity or characteristics. Unique behavior or responses can be used to identify the device or service analyzed. Tor Browser prevents fingerprinting.

browsing history

A browser history is a record of requests made while using a web browser, and includes information like websites visited and when. Tor Browser deletes your browsing history after you close your session.

C

CAPTCHA

Captchas are a challenge-response test used in computing to determine whether the user is human or not. Tor users are often served captchas because Tor relays make so many requests that sometimes websites have a hard time determining whether or not those requests are coming from humans or from bots.

checksum

Checksums are hashvalues of files. If you have downloaded the software without errors, the given checksum and the checksum of your downloaded file will be identical.

circuit

A path through the Tor network built by clients consisting of randomly selected nodes. The circuit begins with either a bridge or a guard. Most circuits consist of three nodes - a guard or bridge, a middle relay, and an exit. Most onion services use six hops in a circuit (with the exception of single onion services), and never an exit node. You can view your current Tor circuit by clicking on the onion button in Tor Browser.

client

In Tor, a client is a node in the Tor network, typically running on behalf of one user, that routes application connections over a series of relays.

Compass

Compass is a web application to learn about currently running Tor relays in bulk.

consensus

In Tor terms, a single document compiled and voted on by the directory authorities once per hour, ensuring that all clients have the same information about the relays that make up the Tor network.

An HTTP cookie (also called web cookie, Internet cookie, browser cookie or simply cookie) is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing. Tor Browser does not store cookies.

cross-site scripting (XSS)

Cross-Site Scripting (XSS) allows an attacker to add malicious functionality or behavior to a website when they shouldn't have the ability to do so.

cryptographic signature

A cryptographic signature proves the authenticity of a message or file. It is created by the holder of the private portion of a public key cryptography key pair and can be verified by the corresponding public key. If you download software from torproject.org, you will find it as signature files (.asc). These are PGP signatures, so you can verify that the file you have downloaded is exactly the one that we intended you to get. For more information about how you can verify signatures, please see here.

D

Daemon

A daemon is a computer program that runs as a background process, rather than being under the direct control of a user.

directory authority

A special-purpose relay that maintains a list of currently-running relays and periodically publishes a consensus together with the other directory authorities.

E

enkripsi

The process of taking a piece of data and scrambling it into a secret code that can only be read by the intended recipient. Tor uses three layers of encryption in the Tor circuit; each relay decrypts one layer before passing the request on to the next relay.

enkripsi end-to-end

Transmitted data which is encrypted from origin to destination is called end-to-end encrypted.

exit

The last relay in the Tor circuit which sends traffic out onto the public Internet. The service you are connecting to (website, chat service, email provider, etc..) will see the IP address of the exit.

ExoneraTor

The ExoneraTor service maintains a database of relay IP addresses that have been part of the Tor network. It answers the question whether there was a Tor relay running on a given IP address on a given date. This service is often useful when dealing with law enforcement.

F

Firefox

Mozilla Firefox is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. Tor Browser is built from a modified version of Firefox ESR (Extended Support Release). Firefox is available for Windows, macOS and Linux operating systems, with its mobile version (fennec) available for Android.

firewall

A firewall is a network security system which monitors and controls the incoming and outgoing network traffic. This traffic filter is based on predetermined rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network but it can also be used as a content filter in the sense of censorship. Sometimes people have trouble connecting to Tor because their firewall blocks Tor connections. You can reconfigure or disable your firewall and restart Tor to test this.

Flash Player

Flash Player is a browser pluginfor Internet applications to watch audio and video content. You should never enable Flash to run in Tor Browser as it is unsafe. Many services that use Flash also offer an HTML5 alternative, which should work in the Tor Browser.

fte

FTE (format-transforming encryption) is a pluggable transport that disguises Tor traffic as ordinary web (HTTP) traffic.

G

GetTor

It is a service that automatically responds to messages (Email, XMPP, Twitter) with links to the latest version of Tor Browser, hosted at a variety of locations, such as Dropbox, Google Drive and GitHub.

GSoC

The Tor Project participates in the Google Summer of Code, which is a summer program for university students.

guard

The first relay in the Tor circuit, unless using a bridge. When using a bridge, the bridge takes the place of the guard.

H

hash

A cryptographic hash value is the result of a mathematical algorithm that maps data to a bit string of a fixed size. It's designed as one-way-function which means the value is easy to calculate in one direction but infeasible to invert. Hash values serve to verify the integrity of data.

hidden services

Former name for "onion services", sometimes still in use in Tor documentation or communication.

hop

In Tor terms, a "hop" refers to traffic moving between relays in a circuit.

HTTP

The Hypertext Transfer Protocol (HTTP) is a channel used to send files and data between devices on a network. Originally used to transfer only web pages, it is now relied upon to deliver many forms of data and communication.

HTTPS

Hypertext Transfer Protocol Secure is the encrypted version of the HTTP channel used to transfer files and data between devices on a network.

HTTPS Everywhere

HTTPS Everywhere is a Firefox, Chrome, and Opera extension that makes HTTPS the default on websites that have set up HTTPS but have not made it the default. HTTPS Everywhere is installed in Tor Browser.

I

Internet Service Provider (ISP)

An Internet service provider (ISP) is an organization that provides services for accessing and using the Internet. When using Tor Browser, your ISP cannot see what websites you're visiting.

alamat IP

An Internet Protocol address (IP address) is a numerical (or alpha-numeric in the case of IPv6) label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. The IP address is the location address of the device, similar to the addresses of physical locations. Tor Browser obscures your location by making it look like your traffic is coming from an IP address that is not your own.

J

JavaScript

JavaScript is a programming language that websites use to offer interactive elements such as video, animation, audio, and status timelines. Unfortunately, JavaScript can also enable attacks on the security of the web browser, which might lead to deanonymization. The NoScript extension in Tor Browser can be used to manage JavaScript on different websites.

K

L

little-t tor

"little-t tor" is one way of referring to tor the network daemon, as opposed to Tor Browser or Tor Project.

M

meek

These pluggable transports all make it look like you are browsing a major web site instead of using Tor. Meek-amazon makes it look like you are using Amazon Web Services; meek-azure makes it look like you are using a Microsoft web site; and meek-google makes it look like you are using Google search.

middle relay

The middle position in the Tor circuit. Non-exit relays can function as either a "middle" or a "guard" for different users.

N

New Identity

New Identity is a Tor Browser feature if you want to prevent your subsequent browser activity from being linkable to what you were doing before. Selecting it will close all your open tabs and windows, clear all private information such as cookies and browsing history, and use New Tor circuits for all connections. Tor Browser will warn you that all activity and downloads will be stopped, so take this into account before clicking “New Identity”. New Identity can also help if Tor Browser is having trouble connecting to a particular site, similarly to "New Tor Circuit for this Site".

cirkuit Tor Baru untuk Situs ini

This option is useful if the exit you are using is unable to connect to the website you require, or is not loading it properly. Selecting it will cause the currently active tab or window to be reloaded over a new Tor circuit. Other open tabs and windows from the same website will use the new circuit as well once they are reloaded. This option does not clear any private information or unlink your activity, nor does it affect your current connections to other websites.

network censorship

Sometimes the direct access to the Tor network is blocked by your Internet Service Provider (ISP) or by a government. Tor Browser includes some circumvention tools for getting around these blocks, including bridges, pluggable transports, and GetTor.

NoScript

Tor Browser includes an add-on called NoScript, accessed through the “S” icon at the top-left of the window, which allows you to control the JavaScriptthat runs on individual web pages, or to block it entirely.

nyx

The anonymizing relay monitor (formerly arm, now nyx) is a terminal status monitor for Tor, intended for command-line usage. This is a tool for monitoring the core Tor process on a system, often useful for relay operators.

O

obfs3

Obfs3 is a pluggable transport that makes Tor traffic look random, so that it does not look like Tor or any other protocol. Obfs3 bridges will work in most places.

obfs4

Obfs4 is a pluggable transport that makes Tor traffic look random like obfs3, and also prevents censors from finding bridges by Internet scanning. Obfs4 bridges are less likely to be blocked than obfs3 bridges.

onion address

A standardized internet domain name used by onion services that ends in .onion and is designed to be self-authenticating.

OONI

OONI stands for "Open Observatory of Network Interference", it is a global observation network for detecting censorship, surveillance and traffic manipulation on the internet.

Onion Browser

An iOS app which is open source, uses Tor routing, and is developed by someone who works closely with the Tor Project. Learn more about Onion Browser

onion services

Onion services (formerly known as “hidden services”) are services (like websites) that are only accessible through the Tor network. Onion services offer advantages over ordinary services on the non-private web, including:

Onionoo

Onionoo is a web-based protocol to learn about currently running Tor relays and bridges. Onionoo provides the data for other applications and websites(compass, atlas, etc..) which in turn present Tor network status information to humans.

onionsite

An onionsite is another name for an onion service, but refers exclusively to websites. These websites use the .onion Top Level Domain (TLD).

onionspace

The set of available onion services. For example, you can say "my site is in onionspace" instead of "my site is in the Dark Web."

Operating System (OS)

The main system software that manages computer hardware and software resources and provides common services for computer programs. The most used desktop operating systems are Windows, macOS and Linux. Android and iOS are the dominant mobile operating systems.

Orbot

Orbot is a free app from The Guardian Project that empowers other apps on your device to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and hide it by bouncing through a series of computers around the world.

Orfox

Orfox is no longer maintained or supported.

To browse the web using Tor on Android, please use the supported Tor Browser for Android app developed by the Tor Project.

P

pluggable transports

Tools that Tor can use to disguise the traffic it sends out. This can be useful in situations where an Internet Service Provider (ISP) or other authority is actively blocking connections to the Tor network.

kunci pribadi

The private portion of a public/private key pair. This is the key that must be kept private, and not disseminated to others.

proksi

A proxy is a middle man between a client (like a web browser) and a service (like a web server). Instead of connecting directly to the service, a client sends the message to the proxy. The proxy makes the request on behalf of the client, and passes the response back to the client. The service only communicates with and sees the proxy.

kunci publik

The public portion of a public/private key pair. This is the key that can be disseminated to others.

public key cryptography

A public-key cryptography system uses pairs of mathematical keys. The public key can be disseminated widely while its belonging private key is known only by the owner of the key pair. Any person can encrypt a message using the public key of the receiver but only the receiver in possession of the private key is able to decrypt the message. Additionally, the private key can be used to create a signature to proof the identity of the creator of a message or other files. This signature can be verified by the public key.

Q

R

relay

A publicly-listed node in the Tor network that forwards traffic on behalf of clients, and that registers itself with the directory authorities.

S

Satori

It is an add-on for the Chrome or Chromium browsers that allows you to download several security and privacy programs, including Tor Browser, from different sources. You can Install Satori from the Chrome Web Store.

scramblesuit

Scramblesuit is similar to obfs4 but has a different set of bridges.

script

Elements used for offering dynamic/interactive content via websites.

self-authenticating address

The specialized address format of onion addresses is self-authenticating. The format automatically guarantees that the onion address is bound to the key used to protect connections to the onionsite. Ordinary internet domain names require site owners to trust and be approved by a Certificate Authority (CA) for this binding, and they are subject to hijack by the CA and typically by many other parties as well.

server

A device on a network which offers a service, such as file and web page storage, email or chat.

session

A session refers to a conversation between two devices communicating on a network. Using Tor Browser means that your session data will be wiped when you close the web browser.

single onion service

A single onion service is an onion service that can be configured for services that do not require anonymity, but want to offer it for clients connecting to their service. Single onion services use only three hops in the circuit rather than the typical six hops for onion services.

Stem

Stem is a Python (programming language) controller library for core Tor. If you want to control core Tor with python, this is for you.

Sybil attack

The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating a large number of identities, and using them to gain a disproportionately large influence in the network.

T

Tails

Tails is a "live" operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims to preserve your privacy and anonymity. Learn more about Tails.

Proyek Tor

The Tor Project can refer to either The Tor Project Inc, a 501(c)3 US nonprofit responsible for maintaining the Tor software, or the Tor Project community made up of thousands of volunteers from all over the world who help create Tor.

third-party tracking

Most websites use numerous third-party services, including advertising and analytics trackers, which collect data about your IP address, web browser, system and your browsing behavior itself, all of which can link your activity across different sites. Tor Browser prevents a lot of this activity from happening.

Tor / Tor network/ Core Tor

Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. Sometimes the software associated with this network is called Core Tor, and sometimes "little-t tor". The way most people use Tor is with Tor Browser which is a version of Firefox that fixes many privacy issues.

Tor Browser

Tor Browser uses the Tor network to protect your privacy and anonymity. Your internet activity, including the names and addresses of the websites you visit, will be hidden from your Internet Service Provider (ISP) and from anyone watching your connection locally. The operators of the websites and services that you use, and anyone watching them, will see a connection coming from the Tor network instead of your real Internet (IP) address, and will not know who you are unless you explicitly identify yourself. Sebagai tambahan, Tor Browser telah didesain untuk mencegah situs melakukan "fingerprinting" atau mengidentifikasi Anda berdasarkan pengaturan peramban Anda. By default, Tor Browser does not keep any browsing history. Cookies hanya valid untuk sesi tunggal (hingga Tor Browser ditutup atau sebuah Identitas Baru diminta).

Tor Launcher

When you run Tor Browser for the first time, you see the Tor Launcher window. It offers you the option to connect directly to the Tor network, or to configure Tor Browser for your connection. In the second case Tor Launcher will take you through a series of configuration options.

Tor log

"Tor log" is an automatically-generated list of Tor’s activity that can help diagnose problems. When something goes wrong with Tor, you may see an option with the error message to "copy Tor log to clipboard". If you don't see this option and you have Tor Browser open, you can navigate to the Torbutton (on the top left of the browser, to the left of the URL bar). Click the Tor button, then open Tor Network Settings. You should see an option at the bottom to copy the log to your clipboard, which you can then paste to a document to show whoever is helping you troubleshoot.

Tor Messenger

Tor Messenger was a cross-platform chat program that aimed to be secure by default and send all of its traffic over Tor. Tor Messenger is not in development anymore. It supported Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, and others; enabled Off-the-Record (OTR) Messaging automatically; and had an easy-to-use graphical user interface localized into multiple languages.

TorBirdy

This extension configures Thunderbird to make connections over Tor.

Torbutton

A button marked by a little green onion to the left of the URL bar. Its menu offers you "New Identity", "Security Settings..." and "Check for Tor Browser Update..." options.

torrc

The core Tor configuration file.

Torsocks

Torsocks allows you to use many applications in a safer way with Tor. It ensures that DNS requests are handled safely and explicitly rejects any traffic other than TCP from the application you're using.

Tor2Web

Tor2web is a project to let users access onion services without using the Tor Browser. NOTE: This is not as safe as connecting to the onion services via Tor Browser, and will remove all Tor-related protections the client would otherwise have.

TPI

TPI is an acronym for The Tor Project, Inc.

tpo

People on IRC often use tpo to abbreviate torproject.org when writing hostnames. For example, trac.tpo is an abbreviation for trac.torproject.org.

traffic

Traffic is the data sent and received by clients and servers.

U

V

W

Web Browser

A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. Major web browsers include Firefox, Chrome, Internet Explorer, and Safari.

website mirror

A website mirror is an one-to-one copy of a website which you can find under other web addresses. A current list of torproject.org mirrors is available at https://www.torproject.org/getinvolved/mirrors.html.en.

X

Y

Z

Tidak ada yang dapat dilakukan oleh para pengembang Tor dalam melacak pengguna Tor. Perlindungan yang menghalangi orang jahat untuk merusak anonimitas Tor juga mencegah kami melacak pengguna.</p>

Saat ini panjangnya path terkode dalam 3 plus jumlah node di path Anda yang sensitif. Yaitu, di keadaan normal, adalah 3, tapi misalnya jika Anda mengakses sebuah onion service atau sebuah alamat ".exit", jumlah ini dapat lebih besar.

Kami tidak ingin mendorong orang untuk menggunakan path lebih panjang dari ini karena akan meningkatkan beban jaringan (sejauh yang kami ketahui) tanpa menambah keamanan. Selain itu, menggunakan jalur yang lebih panjang dari 3 dapat membahayakan anonimitas, pertama karena itu membuat seranganpenolakan keamanan lebih mudah, dan kedua karena itu dapat bertindak sebagai suatu identifier jika hanya sejumlah kecil pengguna memiliki jalan panjang yang sama seperti Anda.

Banyak exit node diatur untuk menghalangi beberapa jenis lalu-lintas file sharing, seperti BitTorrent. BitTorrent tidak anonim di dalam Tor.

For sharing files over Tor, OnionShare is a good option.

Terima kasih atas dukungan Anda! Anda dapat menemukan lebih banyak info tentang sumbangan di ​donor FAQe.

Tor dirancang untuk melindungi hak asasi manusia dan privasi dengan mencegah siapa saja dalam menyensor apapun, mencegah siapapun bahkan diri kami sendiri. Kami tidak suka kalau ada orang-orang yang menggunakan Tor untuk hal-hal buruk, tapi kami tidak dapat melakukan apapun dalam menyingkirkan mereka tanpa mengabaikan aktivis HAM, wartawan, orang-orang yang selamat dari pelecehan, dan orang lain yang menggunakan Tor untuk kebaikan. Jika kami menghalangi sebagian orang menggunakan Tor, kami pada dasarnya akan menambah pintu belakang di perangkat lunak ini, yang akan buka kelemahan pengguna kami kepada pemerintah yang tidak baik dan musuh-musuh lain.</p>

Tor dibiayai beberapa sponsor termasuk lembaga federal Amerika Serikat, yayasan swasta, dan donor individu. Silakan lihat semua sponsors kami dan beberapa posting blogtentang laporan keuangan kami.

We feel that talking openly about our sponsors and funding model is the best way to maintain trust with our community. Kami selalu mencara cara lain dalam pembiayaan, termasuk dari yayasan dan orang perorangan.

Kami tidak menyarankan penggunaan Tor dengan BitTorrent. Untuk penjelasan lebih lanjut, silakan baca ​posting blog tentang hal ini.

Kami minta maaf, tapi Anda telah terinfeksi dengan malware. Tor Project tidak menciptakan malware ini. Pencipta malware itu meminta Anda mengunduh Tor Browser supaya Anda dapat menghubungi mereka secara anonim dengan tebusannya.

Jika ini adalah perkenalan pertama Anda dengan Tor Browser, kami paham kalau Anda berpikir kami adalah orang-orang jahat yang membantu orang-orang yang lebih jahat.

Namu, mohon ketahui bahwa perangkat lunak kami digunakan untuk beragam tujuan oleh aktivis hak asasi manusia, wartawan, orang-orang yang selamat dari kekerasan rumah tangga, whistle blower, penegak hukum, dan banyak lain. Sayangnya, perlindungan yang disediakan perangkat lunak kami kepada orang-orang tersebut dapat disalahgunakan oleh penjahat dan pembuat malware. Tor Project tidak mendukung atau merestui penggunaan perangkat lunak kami untuk tujuan jahat.

Tor tidak menyimpan log apapun yang dapat mengidentifikasi pengguna tertentu. Kami melakukan beberapa langkah aman dalam cara jaringan Tor berfungsi, yang dapat Anda baca di ​Tor Metrics.

Vidalia sudah tidak dipelihara atau didukung. Sebagian besar fitur Vidalia sudah terintegrasi ke Tor Browser.

Get in Touch

Tor mengandalkan dukungan dari pengguna dan sukarelawan di seluruh dunia untuk membantu meningkatkan perangkat lunak dan sumber daya kami, jadi umpan balik Anda sangat berharga untuk kami (dan untuk semua pengguna Tor).

Feedback template

When sending us feedback or reporting a bug, please include as many of these as possible:

  • OS you are using
  • Tor Browser version
  • Step by step of how you got to the issue, so we can reproduce it (e.g. I opened the browser, typed a url, clicked on (i) icon, then my browser crashed)
  • A screenshot of the problem
  • The log

How to Reach Us

There are several ways to reach us, so please use what works best for you.

Trac

You can file a ticket at https://trac.torproject.org. We track all Tor Browser 8 related issues with the ff60-esr keyword. Tickets related to our website should be added with the component "Webpages/Website."

Email

Send us an email at frontdesk at torproject.org

In the subject line of your email, please tell us what you're reporting. The more objective your subject line is (e.g. "Connection failure", "feedback on website", "feedback on Tor Browser, "I need a bridge"), the easier it will be for us to understand and follow up. Sometimes when we receive emails without subject lines, they're marked as spam and we don't see them.

For the fastest response, please write in English, Spanish, and/or Portuguese if you can. If none of these languages works for you, please write on any language you feel comfortable with, but keep in mind it will take us a bit longer to answer as we will need help with translation to understand it.

Blog post comments

You can always leave comments on the blog post related to the issue or feedback you want to report. If there is not a blog post related to your issue, please contact us another way.

IRC

You can find us in the #tor channel on OFTC to give us feedback or report bugs/issues. We may not respond right away, but we do check the backlog and will get back to you when we can.

Learn how to connect to OFTC servers.

Email Lists

For reporting issues or feedback using email lists, we recommend that you do on the one that is related to what you would like to report.

For feedback or issues related to Tor Browser use: tbb-bugs

For feedback or issues related to our websites, please use: ux

For feedback or issues related to Tor network or other projects developed by Tor please use: tor-dev

For feedback or issues related to running a Tor relay please use: tor-relays

For feedback on content related to Tor Browser Manual or Support website: tor-community-team

Here is the simplest possible guide for getting onto IRC and starting to chat with Tor people in real time.

(1) Enter in ​OFTC webchat.

(2) Fill in the blanks:

NICKNAME: Anything you want, but choose the same nickname (nick) every time you use IRC to talk to people on Tor. If your nick is already being used, you will get a message from the system and you should choose another nick.

CHANNEL: #tor

(3) Click Enter

Congratulations! You’re on IRC.

After a few seconds, you will automatically enter #tor, which is essentially a chatroom. It usually includes Tor developers, relay operators and other community members. There are some random people in #tor as well.

You can ask questions here (in the empty bar at the bottom of the screen), and people may be able to answer right away, or there may be a bit of a delay (some people are listed on the channel but are away from their keyboards and record channel activities to read later).

If you want to chat with someone specific, start your comment with their nick (if you know it) and they will typically receive a notification that someone is trying to contact them. Please, don't ask to ask, just ask your question.

You should also consider to use an IRC client.

The #tor-project channel is where Tor people discuss and coordinate daily Tor work. It has fewer members than #tor and is more focused on the work at hand. You are also welcome to join this channel. To access #tor-project, your nickname (nick) must be registered and verified.

Here's how to reach #tor-project and other registered channels. This can be tricky; bring your patience and a cup of your favorite beverage.

Register your nickname

  1. Log onto #tor. See How can I chat with Tor Project teams?

  2. Then, click on the word "Status" at the top left of the screen.

  3. In the window at the bottom of the page, type: /msg nickserv REGISTER yournewpassowrd youremailaddress

  4. Hit enter.

If all goes well, you will receive a message that you are registered.

The system may register you as your nick_ instead of your nick.

If so, just go with it but remember you are user_ and not user.

Every time you log on to IRC, to identify your registered nick, type:

/nick yournick

/msg nickserv IDENTIFY YourPassWord

To verify your nickname

Then, to complete the registration and ultimately gain access to the #tor-project channel, your nickname must be VERIFIED.

  1. To verify your nick, open a new browser window and go to ​https://services.oftc.net/.

  2. Log in with your IRC nickname and password.

  3. Look for the word VERIFIED and log in there. It may appear that nothing has happened. Look at the top of the page, and there will be a column called ACCOUNT.

  4. Click on ACCOUNT.

  5. Click on the small sentence at the bottom of the square that says: Verify account.

  6. Fill out the CAPTCHA that pops up, and click ok.

  7. A tiny message will appear: "Your NickServ account has been verified."

  8. Go back to the IRC webpage where you are logged in and type: /msg nickserv checkverify

  9. Click ENTER

  10. If all is well, you will receive a message that says:

*!NickServ*checkverify

Usermodechange: +R

!NickServ- Successfully set +R on your nick.

Your nick is verified! Hurrah!

Now, to join #tor-project, you can just type:

/join #tor-project and hit enter.

You will be allowed into the channel. If so, Congratulations!

However, if you get stuck, you can ask for help in the #tor channel. You can toggle back and forth between channels by clicking on the different channel names at the top left of the IRC window.