Nama "Tor" mewakili beberapa komponen yang berbeda.
Tor is a program you can run on your computer that helps keep you safe on the Internet.
It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.
This set of volunteer relays is called the Tor network.
The way most people use Tor is with Tor Browser, which is a version of Firefox that fixes many privacy issues.
You can read more about Tor on our about page.
The Tor Project is a non-profit (charity) organization that maintains and develops the Tor software.
Tor is the onion routing network.
When we were starting the new next-generation design and implementation of onion routing in 2001-2002, we would tell people we were working on onion routing, and they would say "Neat. Which one?"
Even if onion routing has become a standard household term, Tor was born out of the actual onion routing project run by the Naval Research Lab.
(It's also got a fine meaning in German and Turkish.)
Note: even though it originally came from an acronym, Tor is not spelled "TOR".
Only the first letter is capitalized.
In fact, we can usually spot people who haven't read any of our website (and have instead learned everything they know about Tor from news articles) by the fact that they spell it wrong.
No, it doesn't.
You need to use a separate program that understands your application and protocol and knows how to clean or "scrub" the data it sends.
Tor Browser tries to keep application-level data, like the user-agent string, uniform for all users.
Tor Browser can't do anything about the text that you type into forms, though.
A typical proxy provider sets up a server somewhere on the Internet and allows you to use it to relay your traffic.
This creates a simple, easy to maintain architecture.
The users all enter and leave through the same server.
The provider may charge for use of the proxy, or fund their costs through advertisements on the server.
In the simplest configuration, you don't have to install anything.
You just have to point your browser at their proxy server.
Simple proxy providers are fine solutions if you do not want protections for your privacy and anonymity online and you trust the provider to not do bad things.
Some simple proxy providers use SSL to secure your connection to them, which protects you against local eavesdroppers, such as those at a cafe with free wifi Internet.
Simple proxy providers also create a single point of failure.
The provider knows both who you are and what you browse on the Internet.
They can see your traffic as it passes through their server.
In some cases, they can even see inside your encrypted traffic as they relay it to your banking site or to ecommerce stores.
You have to trust the provider isn't watching your traffic, injecting their own advertisements into your traffic stream, or recording your personal details.
Tor passes your traffic through at least 3 different servers before sending it on to the destination.
Because there's a separate layer of encryption for each of the three relays, somebody watching your Internet connection can't modify, or read, what you are sending into the Tor network.
Your traffic is encrypted between the Tor client (on your computer) and where it pops out somewhere else in the world.
Doesn't the first server see who I am?
A bad first of three servers can see encrypted Tor traffic coming from your computer.
It still doesn't know who you are and what you are doing over Tor.
It merely sees "This IP address is using Tor".
You are still protected from this node figuring out both who you are and where you are going on the Internet.
Can't the third server see my traffic?
A bad third of three servers can see the traffic you sent into Tor.
It won't know who sent this traffic.
If you're using encryption (like HTTPS), it will only know the destination.
See this visualization of Tor and HTTPS to understand how Tor and HTTPS interact.
Tor adalah perangkat lunak tidak berbayar free software.
Ini berarti kami memberi Anda hak untuk mendistribusikan perangkat lunak Tor, baik yang dimodifikasi atau tidak dimodifikasi, baik dengan biaya atau pun gratis.
Anda tidak perlu meminta izin khusus dari kami.
However, if you want to redistribute the Tor software you must follow our LICENSE.
Essentially this means that you need to include our LICENSE file along with whatever part of the Tor software you're distributing.
Most people who ask us this question don't want to distribute just the Tor software, though.
They want to distribute the Tor Browser.
This includes Firefox Extended Support Release, and the NoScript and HTTPS-Everywhere extensions.
You will need to follow the license for those programs as well.
Both of those Firefox extensions are distributed under the GNU General Public License, while Firefox ESR is released under the Mozilla Public License.
The simplest way to obey their licenses is to include the source code for these programs everywhere you include the bundles themselves.
Also, you should make sure not to confuse your readers about what Tor is, who makes it, and what properties it provides (and doesn't provide).
See our trademark FAQ for details.
Ada banyak program lain yang dapat Anda gunakan dengan Tor, tetapi kami belum meneliti masalah anonimitas tingkat aplikasi pada semuanya dengan cukup baik untuk dapat merekomendasikan konfigurasi yang aman.
Wiki page kami memiliki daftar petunjuk yang dikelola komunitas untuk Torifying specific applications.
Please add to this list and help us keep it accurate!
Kebanyakan orang menggunakan Tor Browser, karena memiliki semua yang Anda butuhkan untuk menjelajahi web dengan aman menggunakan Tor.
Menggunakan Tor dengan browser lain itu dangerous and not recommended.
Sama sekali tidak ada backdoor pada Tor.
We know some smart lawyers who say that it's unlikely that anybody will try to make us add one in our jurisdiction (U.S.).
If they do ask us, we will fight them, and (the lawyers say) probably win.
Kami tidak akan pernah menempatkan backdoor pada Tor.
Kami berpikir bahwa menempatkan backdoor di Tor akan sangat tidak bertanggung jawab kepada pengguna kami, dan merupakan contoh buruk bagi perangkat lunak keamanan secara umum.
If we ever put a deliberate backdoor in our security software, it would ruin our professional reputation.
Nobody would trust our software ever again - for excellent reasons!
But that said, there are still plenty of subtle attacks people might try.
Seseorang mungkin menyamar sebagai kami, atau membobol komputer kami, atau sesuatu seperti itu.
Tor adalah open source software, dan Anda harus selalu memeriksa sumbernya (atau setidaknya memeriksa perbedaan dengan rilis terakhir) untuk hal-hal yang mencurigakan.
If we (or the distributors that gave you Tor) don't give you access to the source code, that's a sure sign something funny might be going on.
Anda juga harus memeriksa PGP signatures pada rilis, untuk memastikan tidak ada yang mengacaukan situs distribusi.
Juga, di sana mungkin saja terdapat bug yang tidak disengaja pada Tor yang dapat memengaruhi anonimitas Anda.
Kami secara berkala menemukan dan memperbaiki bug terkait anonimitas, jadi pastikan Anda selalu memperbarui versi Tor Anda.