Tor Browser

Digital signature is a process ensuring that a certain package was generated by its developers and has not been tampered with. Below we explain why it is important and how to verify that the Tor program you download is the one we have created and has not been modified by some attacker.

Each file on our download page is accompanied by a file labelled "signature" with the same name as the package and the extension ".asc". These .asc files are OpenPGP signatures. They allow you to verify the file you've downloaded is exactly the one that we intended you to get. This will vary by web browser, but generally you can download this file by right-clicking the "signature" link and selecting the "save file as" option.

For example, torbrowser-install-win64-9.0_en-US.exe is accompanied by torbrowser-install-win64-9.0_en-US.exe.asc. These are example file names and will not exactly match the file names that you download.

We now show how you can verify the downloaded file's digital signature on different operating systems. Please notice that a signature is dated the moment the package has been signed. Therefore every time a new file is uploaded a new signature is generated with a different date. As long as you have verified the signature you should not worry that the reported date may vary.

Installing GnuPG

First of all you need to have GnuPG installed before you can verify signatures.

For Windows users:

If you run Windows, download Gpg4win and run its installer.

In order to verify the signature you will need to type a few commands in windows command-line, cmd.exe.

For macOS users:

If you are using macOS, you can install GPGTools.

In order to verify the signature you will need to type a few commands in the Terminal (under "Applications").

For GNU/Linux users:

If you are using GNU/Linux, then you probably already have GnuPG in your system, as most GNU/Linux distributions come with it preinstalled.

In order to verify the signature you will need to type a few commands in a terminal window. How to do this will vary depending on your distribution.

Fetching the Tor Developers key

The Tor Browser team signs Tor Browser releases. Import the Tor Browser Developers signing key (0xEF6E286DDA85EA2A4BA7DE684E2C6E8793298290):

gpg --auto-key-locate nodefault,wkd --locate-keys

This should show you something like:

gpg: key 4E2C6E8793298290: public key "Tor Browser Developers (signing key) <>" imported
gpg: Total number processed: 1
gpg:               imported: 1
pub   rsa4096 2014-12-15 [C] [expires: 2025-07-21]
uid           [ unknown] Tor Browser Developers (signing key) <>
sub   rsa4096 2018-05-26 [S] [expires: 2020-12-19]

If you get an error message, something has gone wrong and you cannot continue until you've figured out why this didn't work. You might be able to import the key using the Workaround (using a public key) section instead.

After importing the key, you can save it to a file (identifying it by its fingerprint here):

gpg --output ./tor.keyring --export 0xEF6E286DDA85EA2A4BA7DE684E2C6E8793298290

This command results in the key being saved to a file found at the path ./tor.keyring, i.e. in the current directory. If ./tor.keyring doesn't exist after running this command, something has gone wrong and you cannot continue until you've figured out why this didn't work.

Verifying the signature

To verify the signature of the package you downloaded, you will need to download the corresponding ".asc" signature file as well as the installer file itself, and verify it with a command that asks GnuPG to verify the file that you downloaded.

The examples below assume that you downloaded these two files to your "Downloads" folder. Note that these commands use example file names and yours will be different: you will have downloaded a different version than 9.0 and you may not have chosen the English (en-US) version.

For Windows users:

gpgv --keyring .\tor.keyring Downloads\torbrowser-install-win64-9.0_en-US.exe.asc Downloads\torbrowser-install-win64-9.0_en-US.exe

For macOS users:

gpgv --keyring ./tor.keyring ~/Downloads/TorBrowser-9.0-osx64_en-US.dmg.asc ~/Downloads/TorBrowser-9.0-osx64_en-US.dmg

For GNU/Linux users (change 64 to 32 if you have the 32-bit package):

gpgv --keyring ./tor.keyring ~/Downloads/tor-browser-linux64-9.0_en-US.tar.xz.asc ~/Downloads/tor-browser-linux64-9.0_en-US.tar.xz

The result of the command should produce something like this:

gpgv: Signature made 07/08/19 04:03:49 Pacific Daylight Time
gpgv:                using RSA key EB774491D9FF06E2
gpgv: Good signature from "Tor Browser Developers (signing key) <>"

If you get error messages containing 'No such file or directory', either something went wrong with one of the previous steps, or you forgot that these commands use example file names and yours will be a little different.

Workaround (using a public key)

If you encounter errors you cannot fix, feel free to download and use this public key instead. Alternatively, you may use the following command:

curl -s |gpg --import -

You may also want to learn more about GnuPG.

Please see the Installation section in the Tor Browser Manual.

File yang Anda download dan jalankan akan meminta Anda untuk sebuah destinasi. Jika Anda tidak ingat destinasi tersebut, itu adalah kemungkinan unduhan atau Desktop folder.

The default setting in the Windows installer also creates a shortcut for you on your Desktop, though be aware that you may have accidentally deselected the option to create a shortcut.

Jika Anda tidak dapat menemukannya di salah satu folder tersebut, download lagi dan cari prompt yang meminta Anda untuk memilih direktori untuk men-download itu. Pilih lokasi direktori yang Anda akan ingat dengan mudah, dan setelah download selesai Anda akan melihat folder Tor Browser yang ada.

Setiap kali kami merilis versi stabil baru Tor Browser, kami menulis posting blog yang merinci fitur-fiturnya yang baru dan masalah yang diketahui. If you started having issues with your Tor Browser after an update, check out for a post on the most recent stable Tor Browser to see if your issue is listed. If your issue is not listed there, please check first Tor Browser's issue tracker and create a GitLab issue about what you're experiencing.

We want everyone to be able to enjoy Tor Browser in their own language. Tor Browser is now available in 30 different languages, and we are working to add more. Want to help us translate? Become a Tor translator!

You can also help us in testing the next languages we will release, by installing and testing Tor Browser Alpha releases.

No, Tor Browser is an open source software and it is free. Any browser forcing you to pay and is claiming to be Tor Browser is fake. To make sure you are downloading the right Tor Browser visit our download page. After downloading, you can make sure that you have the official version of Tor Browser by verifying the signature. If you are not able to access our website, then visit censorship section to get information about alternate way of downloading Tor Browser.

You can report fake Tor Browsers on

Tor Browser saat ini tersedia di Windows, [Linux] ( dan [macOS] (

Juga ada versi Tor Browser untuk Android dan The Guardian Project juga menyediakan aplikasi Orbot untuk merutekan aplikasi lain di perangkat Android Anda melalui jaringan Tor.

Belum ada versi resmi Tor untuk iOS sampai sekarang, namun kami merekomendasikan Onion Browser.

Sayangnya, kami belum memiliki versi Tor Browser untuk Chrome OS. You could run Tor Browser for Android on Chrome OS. Note that by using Tor Mobile on Chrome OS, you will view the mobile (not desktop) versions of websites. However, because we have not audited the app in Chrome OS, we don't know if all the privacy features of Tor Browser for Android will work well.

Maaf, saat ini tidak ada dukungan resmi Tor Browser untuk *BSD. There is something called the TorBSD project, but their Tor Browser is not officially supported.

Tor Browser kadang-kadang lebih lambat dari peramban lain. The Tor network has over a million daily users, and just over 6000 relays to route all of their traffic, and the load on each server can sometimes cause latency. And, by design, your traffic is bouncing through volunteers' servers in various parts of the world, and some bottlenecks and network latency will always be present. You can help improve the speed of the network by running your own relay, or encouraging others to do so. For the much more in-depth answer, see Roger's blog post on the topic and Tor's Open Research Topics: 2018 edition about Network Performance. Walaupun begitu, Tor sekarang jauh lebih cepat daripada sebelumnya dan Anda mungkin tidak benar-benar melihat perubahan kecepatan dari peramban lain.

While the names may imply otherwise, 'Incognito mode' and 'private tabs' do not make you anonymous on the Internet. They erase all the information on your machine relating to the browsing session after they are closed, but have no measures in place to hide your activity or digital fingerprint online. This means that an observer can collect your traffic just as easily as any regular browser.

Tor Browser offers all the amnesic features of private tabs while also hiding the source IP, browsing habits and details about a device that can be used to fingerprint activity across the web, allowing for a truly private browsing session that's fully obfuscated from end-to-end.

For more information regarding the limitations of Incognito mode and private tabs, see Mozilla's article on Common Myths about Private Browsing.

There are methods for setting Tor Browser as your default browser, but those methods may not work always or in every operating system. Tor Browser bekerja keras untuk mengisolasi diri dari seluruh sistem Anda, dan langkah-langkah untuk membuat default browser tidak dapat diandalkan. This means sometimes a website would load in the Tor Browser, and sometimes it would load in another browser. This type of behavior can be dangerous and break anonymity.

Kami sangat menyarankan untuk tidak menggunakan Tor di browser apapun selain Tor Browser. Menggunakan Tor di browser lain dapat membuat Anda rentan tanpa perlindungan privasi browser Tor.

Anda bisa menggunakan browser lain saat Anda juga menggunakan Tor Browser. Namun, Anda harus tahu bahwa fitur privasi Tor Browser tidak akan hadir di dalam browser lainnya. Hati-hati ketika beralih bolak-balik antara Tor dan browser yang kurang aman, karena Anda mungkin secara tidak sengaja menggunakan browser lain untuk sesuatu yang Anda dimaksudkan untuk Tor.

Jika Anda menjalankan Tor Browser dan browser lain pada saat yang sama, tidak akan mempengaruhi kinerja atau privasi Tor. Namun, ketahuilah bahwa browser Anda yang lain tidak menjaga kerahasiaan aktivitas Anda, dan Anda mungkin lupa dan secara tidak sengaja menggunakan browser non-pribadi tersebut untuk melakukan sesuatu yang ingin Anda lakukan di Tor Browser.

Hanya lalu lintas Tor Browser akan diarahkan melalui jaringan Tor. Aplikasi lain pada sistem Anda (termasuk browser lain) tidak akan diarahkan melalui jaringan Tor, dan akan tidak dilindungi. Mereka perlu secara terpisah dikonfigurasi untuk menggunakan Tor. If you need to be sure that all traffic will go through the Tor network, take a look at the Tails live operating system which you can start on almost any computer from a USB stick or a DVD.

Kami tidak merekomendasikan menjalankan beberapa Tor browser secara bersamaan, dan ini mungkin tidak bekerja seperti yang diantisipasi pada banyak platform.

Tor Browser is built using Firefox ESR, so errors regarding Firefox may occur. Pastikan tidak ada Tor browser lain sedang berjalan, dan bahwa Anda telah mengekstrak Tor Browser di lokasi yang pengguna memiliki izin yang sesuai. If you are running an anti-virus, please see My antivirus/malware protection is blocking me from accessing Tor Browser, it is common for anti-virus / anti-malware software to cause this type of issue.

Tor Browser adalah versi modifikasi dari Firefox yang khusus dirancang untuk digunakan dengan Tor. Banyak pekerjaan telah dimasukkan ke dalam membuat Tor Browser, termasuk penggunaan tambahan patch untuk meningkatkan privasi dan keamanan. Meskipun secara teknis mungkin menggunakan Tor dengan browser lain, Anda dapat membuka diri terhadap serangan potensial atau kebocoran informasi, sehingga kami sangat melarang itu. Learn more about the design of Tor Browser.

Bookmarks in the Tor Browser can be exported, imported, backup, restored as well as imported from another browser. In order to manage your bookmarks in Tor Browser, go to:

  • Hamburger menu >> Library >> Bookmarks >> Show All Bookmarks (below the menu)
  • From the toolbar on the Library window, click Import and Backup

If you wish to export bookmarks

  • Choose Export Bookmarks to HTML
  • In the Export Bookmarks File window that opens, choose a location to save the file, which is named bookmarks.html by default. The desktop is usually a good spot, but any place that is easy to remember will work.
  • Click the Save button. The Export Bookmarks File window will close.
  • Close the Library window.

Your bookmarks are now successfully exported from Tor Browser. The bookmarks HTML file you saved is now ready to be imported into another web browser.

If you wish to import bookmarks

  • Choose Import Bookmarks from HTML
  • Within the Import Bookmarks File window that opens, navigate to the bookmarks HTML file you are importing and select the file.
  • Click the Open button. The Import Bookmarks File window will close.
  • Close the Library window.

The bookmarks in the selected HTML file will be added to your Tor Browser within the Bookmarks Menu directory.

If you wish to backup

  • Choose Backup
  • A new window opens and you have to choose the location to save the file. The file has a .json extension.

If you wish to restore

  • Choose Restore and then select the bookmark file you wish to restore.
  • Click okay to the pop up box that appears and hurray, you just restored your backup bookmark.

Import data from another browser

Bookmarks can be transferred from Firefox to Tor Browser. There are two ways to export and import bookmarks in Firefox: HTML file or JSON file. After exporting the data from the browser, follow the above step to import the bookmark file into your Tor Browser.

When you have Tor Browser open, you can navigate to the hamburger menu ("≡"), then click on "Preferences", and finally on "Tor" in the side bar. At the bottom of the page, next to the "View the Tor logs" text, click the button "View Logs...". You should see an option to copy the log to your clipboard, which you will be able to paste it into a text editor or an email client.

Tor Browser in its default mode is starting with a content window rounded to a multiple of 200px x 100px to prevent fingerprinting the screen dimensions. The strategy here is to put all users in a couple of buckets to make it harder to single them out. That works so far until users start to resize their windows (e.g. by maximizing them or going into fullscreen mode). Tor Browser 9 ships with a fingerprinting defense for those scenarios as well, which is called Letterboxing, a technique developed by Mozilla and presented in 2019. It works by adding white margins to a browser window so that the window is as close as possible to the desired size while users are still in a couple of screen size buckets that prevent singling them out with the help of screen dimensions.

In simple words, this technique makes groups of users of certain screen sizes and this makes it harder to single out users on basis of screen size, as many users will have same screen size.

Tor Browser tentu-saja dapat membantu dalam meng-akses situs web Anda, dari tempat dimana terblokir. Umumnya hanya unduh Tor Browser dan gunakannya untuk membuka akses situs yang terblokir. Di tempat-tempat yang mengalami sensor berat, tersedia beberapa pilihan untuk mengatasinya, salah-satunya termasuk pluggable transport.

Untuk info lebih lanjut, silakan baca bagian Tor Browser User Manual di bagian censorship.

Kadang beberapa situs web memblokir pengguna Tor karena tidak dapat membedakan pengguna Tor biasa dan lalu-lintas otomatis. Hal terbaik yang dapat dilakukan adalah pengguna menghubungi langsung admin situsnya. Ini mungkin dapat menjadi contoh:

Halo! Saya berusaha melakukan akses terhadap situs Anda melalui Tor Browser dan ternyata Anda tidak mengizinkan pengguna Tor untuk melakukan akses terhadap situs Anda. Saya mohon dengan sangat untuk mempertimbangkan hal ini; Tor digunakan orang-orang di seluruh dunia untuk melindungi privasi mereka dan melawan sensor. Dengan memblokir pengguna Tor, Anda akan memblokir orang-orang di negara-negara represif yang ingin menggunakan Internet secara bebas, wartawan, dan peneliti yang ingin melindungi diri sendiri dari penemuan, termasuk whistleblower, aktivis, dan orang-orang biasa yang ingin terbebas dari pelacakan menyeluruh yang dilakukan pihak lain. Mohon dukungan penuh terhadap privasi digital dan kebebasan Internet, dan izinkan pengguna Tor untuk melakukan akses ke Terima kasih!

Untuk situs web perbankan dan situs web lain yang sensitif, umumnya ada pemblokiran berdasarkan wilayah geografis (jika bank Anda mengetahui Anda biasanya melakukan akses terhadap jasa mereka dari suatu negara dan jika tiba-tiba Anda membuka situs web mereka dari exit relay di negara lain, akun Anda mungkin akan dikunci atau dibekukan).

If you are unable to connect to an onion service, please see I cannot reach X.onion!.

Tor Browser sering membuat koneksi Anda seakan-akan datang dari bagian dunia yang sama sekali berbeda. Sejumlah situs, seperti bank atau penyedia email mungkin saja mengartikan ini sebagai tanda bahwa akun Anda telah diretas atau terkompromikan dan mengkunci Anda dari layanan.

Satu-satunya cara untuk memecahkan masalah ini adalah dengan mematuhi prosedur yang direkomendasikan oleh situs yang dimaksud untuk menjalankan pemulihan akun atau menghubungi operator dan menjelaskan situasi Anda.

Anda mungkin mampu menghindari skenario ini jika penyedia layanan menawarkan 2-factor authentication, yang merupakan pilihan keamanan yang jauh lebih baik daripada reputasi berbasis IP. Hubungi penyedia layanan Anda dan tanya mereka jika mereka menyediakan 2FA.

Kadang-kadang website yang banyak menggunakan JavaScript dapat memiliki masalah fungsional di Tor Browser. The simplest fix is to click on the Security icon (the small gray shield at the top-right of the screen), then click "Advanced Security Settings..." Atur keamanan Anda ke "Standar".

Most antivirus or malware protection allows the user to "allowlist" certain processes that would otherwise be blocked. Please open your antivirus or malware protection software and look in the settings for a "allowlist" or something similar. Selanjutnya, kecualikan proses berikut:

  • Untuk Windows
    • firefox.exe
    • tor.exe
    • obfs4proxy.exe (jika Anda menggunakan bridge)
  • For macOS
    • TorBrowser
    • tor.real
    • obfs4proxy (jika Anda menggunakan bridge)

Akhirnya, restart Tor Browser. Ini seharusnya memperbaiki masalah yang Anda alami. Harap dicatat bahwa beberapa klien antivirus, seperti Kaspersky, juga dapat memblokir Tor di tingkat firewall.

Some antivirus software will pop up malware and/or vulnerability warnings when Tor Browser is launched. If you downloaded Tor Browser from our main website or used GetTor, and verified it, these are false positives and you have nothing to worry about. Some antiviruses consider that files that have not been seen by a lot of users as suspicious. To make sure that the Tor program you download is the one we have created and has not been modified by some attacker, you can verify Tor Browser's signature. You may also want to permit certain processes to prevent antiviruses from blocking access to Tor Browser.

Anda mungkin pada jaringan disensor, sehingga Anda harus mencoba menggunakan bridge. Beberapa bridge dibuat untuk Tor Browser, dan Anda dapat menggunakannya dengan memilih "mengkonfigurasi" (kemudian mengikuti petunjuknya) di jendela Tor Launcher yang muncul ketika Anda membuka Tor Browser untuk pertama kalinya. Jika Anda memerlukan bridge lain, Anda dapat memperolehnya di situs web bridge kami. Untuk info lebih lanjut tentang bridge, silakan baca petunjuk Tor Browser.

Salah satu masalah yang paling umum yang menyebabkan kesalahan koneksi di Tor Browser adalah jam sistem yang keliru. Silakan pastikan jam di sistem operasi dan zona waktu diatur dengan tepat di komputer Anda. Jika ini tidak memperbaiki masalah koneksi, lihat halaman Troubleshooting di [petunjuk Tor Browser(

Sometimes, after you've used Gmail over Tor, Google presents a pop-up notification that your account may have been compromised. The notification window lists a series of IP addresses and locations throughout the world recently used to access your account.

In general, this is a false alarm: Google saw a bunch of logins from different places, as a result of running the service via Tor, and decided it was a good idea to confirm the account was being accessed by its rightful owner.

Even though this may be a byproduct of using the service via Tor, that doesn't mean you can entirely ignore the warning. It is probably a false positive, but it might not be since it is possible for someone to hijack your Google cookie.

Cookie hijacking is possible by either physical access to your computer or by watching your network traffic. In theory, only physical access should compromise your system because Gmail and similar services should only send the cookie over an SSL link. In practice, alas, it's way more complex than that.

And if somebody did steal your Google cookie, they might end up logging in from unusual places (though of course they also might not). So the summary is that since you're using Tor Browser, this security measure that Google uses isn't so useful for you, because it's full of false positives. You'll have to use other approaches, like seeing if anything looks weird on the account, or looking at the timestamps for recent logins and wondering if you actually logged in at those times.

More recently, Gmail users can turn on 2-Step Verification on their accounts to add an extra layer of security.

This is a known and intermittent problem; it does not mean that Google considers Tor to be spyware.

When you use Tor, you are sending queries through exit relays that are also shared by thousands of other users. Tor users typically see this message when many Tor users are querying Google in a short period of time. Google interprets the high volume of traffic from a single IP address (the exit relay you happened to pick) as somebody trying to "crawl" their website, so it slows down traffic from that IP address for a short time.

You can try 'change the circuit for this site' to access the website from a different IP address.

An alternate explanation is that Google tries to detect certain kinds of spyware or viruses that send distinctive queries to Google Search. It notes the IP addresses from which those queries are received (not realizing that they are Tor exit relays), and tries to warn any connections coming from those IP addresses that recent queries indicate an infection.

To our knowledge, Google is not doing anything intentionally specifically to deter or block Tor use. The error message about an infected machine should clear up again after a short time.

Unfortunately, some websites deliver Captchas to Tor users, and we are not able to remove Captchas from websites. The best thing to do in these cases is to contact the website owners, and inform them that their Captchas are preventing users such as yourself from using their services.

Google uses "geolocation" to determine where in the world you are, so it can give you a personalized experience. This includes using the language it thinks you prefer, and it also includes giving you different results on your queries.

If you really want to see Google in English you can click the link that provides that. But we consider this a feature with Tor, not a bug --- the Internet is not flat, and it in fact does look different depending on where you are. This feature reminds people of this fact.

Note that Google search URLs take name/value pairs as arguments and one of those names is "hl". If you set "hl" to "en" then Google will return search results in English regardless of what Google server you have been sent to. On a query this looks like:

Another method is to simply use your country code for accessing Google. This can be,, and so on.

Saat menggunakan Tor Browser, tidak ada yang bisa melihat situs web yang Anda kunjungi. Namun, penyedia layanan atau admin jaringan Anda mungkin dapat melihat bahwa Anda tersambung ke jaringan Tor, meskipun mereka tidak akan tahu apa yang Anda lakukan ketika Anda menggunakannya.

Tor Browser mencegah orang lain mengetahui situs web yang Anda kunjungi. Beberapa entitas, seperti Penyedia Layanan Internet (ISP), dapat melihat bahwa Anda menggunakan Tor, tetapi mereka tidak akan tahu kemana Anda berselancar saat Anda melakukannya.

DuckDuckGo is the default search engine in Tor Browser. DuckDuckGo does not track its users nor does it store any data about user searches. Learn more about DuckDuckGo privacy policy.

Dengan rilis dari Tor Browser 6.0.6, kami beralih ke DuckDuckGo sebagai mesin pencari utama. For a while now, Disconnect, which was formerly used in Tor Browser, has had no access to Google search results. Since Disconnect is more of a meta search engine, which allows users to choose between different search providers, it fell back to delivering Bing search results, which were basically unacceptable quality-wise.

Please see the DuckDuckGo support portal. If you believe this is a Tor Browser issue, please report it on our issue tracker.

Tor Browser memiliki dua cara untuk mengubah sirkuit relay Anda — "Identitas baru" dan "Tor sirkuit Baru untuk situs ini". Both options are located in the hamburger menu ("≡"). You can also access the New Circuit option inside the site information menu in the URL bar, and the New Identity option by clicking the small sparky broom icon at the top-right of the screen

New Identity

Pilihan ini berguna jika Anda ingin mencegah aktivitas browser Anda agar tidak terhubung dengan apa yang Anda lakukan sebelumnya.

Memilihnya akan menutup semua tab dan jendela yang terbuka, menghapus semua informasi pribadi seperti cookies dan riwayat penjelajahan, dan menggunakan sirkuit Tor baru untuk semua koneksi.

Browser Tor akan memperingatkan Anda bahwa semua aktivitas dan unduhan akan dihentikan, jadi pertimbangkanlah ini sebelum mengklik "New Identity".

Tor Browser Menu

New Tor Circuit for this Site

Pilihan ini berguna jika relay keluar tidak dapat terhubung ke situs web, atau situsnya tidak ditampilkan dengan benar. Memilihnya akan menyebabkan tab atau jendela yang aktif saat ini akan dimuat ulang melalui sebuah sirkuit Tor yang baru.

Tabs atau jendela lain yang sedang terbuka dari website yang sama akan menggunakan sirkuit yang baru demikian juga dengan yang sedang dijalankan.

Opsi ini tidak akan menghilangkan setiap infomasi pribadi atau tidak menghubungkan aktivitas anda, tidak juga berdampak pada koneksi anda saat ini pada website yang lain.

New Circuit for this Site

Menjalankan Tor Browser tidak membuat Anda bertindak sebagai relay dalam jaringan. Ini berarti bahwa komputer Anda tidak akan digunakan untuk merutekan lalu lintas untuk orang lain. If you'd like to become a relay, please see our Tor Relay Guide.

Itu adalah perilaku normal Tor. Relay pertama di sirkuit Anda disebut "penjaga entri" atau "penjaga". Ini adalah relay yang sangat cepat dan stabil yang tetap menjadi relay yang pertama dalam sirkuit Anda selama 2-3 bulan untuk melindungi terhadap serangan perusak anonimitas yang dikenal. Sisa sirkuit Anda berubah untuk setiap website baru setiap Anda mengunjunginya, dan semua bersama-sama relay ini memberikan perlindungan privasi lengkap Tor. For more information on how guard relays work, see this blog post and paper on entry guards.

Di Tor Browser, setiap domain baru mendapatkan sirkuitnya sendiri. The Design and Implementation of Tor Browser document further explains the thinking behind this design.

Memodifikasi cara Tor menciptakan sirkuit sangat tidak disarankan. Anda mendapatkan keamanan terbaik yang dapat diberikan Tor ketika Anda meninggalkan pilihan rute kepada Tor; mengubah node masuk/keluar dapat mengurangi anonimitas Anda. Jika hasil yang Anda inginkan adalah hanya untuk dapat mengakses sumber daya yang tersedia hanya di satu negara, Anda mungkin ingin mempertimbangkan menggunakan VPN daripada menggunakan Tor. Harap dicatat bahwa vpn tidak memiliki sifat privasi yang sama dengan Tor, tetapi mereka akan membantu memecahkan beberapa masalah pembatasan geolokasi.

WARNING: Do NOT follow random advice instructing you to edit your torrc! Doing so can allow an attacker to compromise your security and anonymity through malicious configuration of your torrc.

Tor uses a text file called torrc that contains configuration instructions for how Tor should behave. The default configuration should work fine for most Tor users (hence the warning above.)

To find your Tor Browser torrc, follow the instructions for your operating system below.

On Windows or Linux:

  • The torrc is in the Tor Browser Data directory at Browser/TorBrowser/Data/Tor inside your Tor Browser directory.

On macOS:

  • The torrc is in the Tor Browser Data directory at ~/Library/Application Support/TorBrowser-Data/Tor.
  • Note the Library folder is hidden on newer versions of macOS. To navigate to this folder in Finder, select "Go to Folder..." in the "Go" menu.
  • Then type "~/Library/Application Support/" in the window and click Go.

Close Tor Browser before you edit your torrc, otherwise Tor Browser may erase your modifications. Some options will have no effect as Tor Browser overrides them with command line options when it starts Tor.

Have a look at the sample torrc file for hints on common configurations. For other configuration options you can use, see the Tor manual page. Remember, all lines beginning with # in torrc are treated as comments and have no effect on Tor's configuration.

Sangat tidak dianjurkan untuk memasang add-on baru di Tor Browser karena mereka dapat membahayakan privasi dan keamanan Anda.

Menginstal add-on baru dapat memengaruhi Tor Browser dengan cara yang tidak terduga dan berpotensi menjadikan Tor Browser Anda memiliki kode fingerprint/sidi-kjari atau identitas unik. Jika Tor Browser Anda memiliki kode fingerprint/sidik-jari unik, kegiatan browsing Anda dapat dikenali dan dilacak meskipun Anda menggunakan Tor Browser.

Pada dasarnya, setiap pengaturan dan fitur pada browser menghasilkan apa yang disebut "browser fingerprint" atau dapat disebut "kode sidik-jari browser". Sebagian besar browser secara tidak sengaja menciptakan kode fingerprint/sidik-jari unik untuk masing-masing pengguna, yang menjadikan setiap masing-masing penggunanya dapat dikenali dan dilacak di dalam internet. Tor Browser is specifically engineered to have a nearly identical (we're not perfect!) fingerprint across its users. Ini artinya, setiap pengguna Tor Browser terlihat seperti setiap pengguna Tor Browser lainnya, sehingga menjadikannya sulit untuk dapat melacak kegiatan dari satu individu pengguna.

Disanapun juga terdapat peluang bahwa sebuah add-on baru, akan meningkatkan timbulnya serangan terhadap Tor Browser. Ini dapat memungkinkan bocornya data sensitif atau memungkinkan penyerang untuk dapat menginfeksi Tor Browser. Sebuah add-on itu sendiri pun bahkan bisa dirancang jahat untuk memata-matai Anda.

Tor Browser sendiri telah memiliki dua add-ons bawaan terinstall — HTTPS Everywhere dan NoScript — dan menambahkan hal lain dapat saja merusak anomimisitas Anda.

Ingin mempelajari lebih lanjut tentang fingerprinting? Berikut ini adalah artikel di dalam The Tor Blog all about it.

Flash is disabled in Tor Browser, and we recommend you to not enable it. Kami tidak berpikir Flash aman untuk digunakan dalam browser apapun — ini adalah software yang sangat tidak aman yang dengan mudah dapat membahayakan privasi Anda atau memberikan malware kepada Anda. Untungnya, sebagian besar situs web, perangkat, dan peramban lain menjauh dari penggunaan Flash.

You can set Proxy IP address, port, and authentication information in Tor Browser's Network Settings. If you're using Tor another way, check out the HTTPProxy and HTTPSProxy config options in the manual page, and modify your torrc file accordingly. You will need an HTTP proxy for doing GET requests to fetch the Tor directory, and you will need an HTTPS proxy for doing CONNECT requests to get to Tor relays. (It's fine if they're the same proxy.) Tor also recognizes the torrc options Socks4Proxy and Socks5Proxy.

Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator options if your proxy requires auth. We only support basic auth currently, but if you need NTLM authentication, you may find this post in the archives useful.

If your proxies only allow you to connect to certain ports, look at the entry on Firewalled clients for how to restrict what ports your Tor will try to access.

Please see the HTTPS Everywhere FAQ. If you believe this is a Tor Browser issue, please report it on our issue tracker.

Kami mengonfigurasi NoScript untuk mengizinkan JavaScript secara default di Tor Browser karena banyak situs web tidak akan berfungsi dengan JavaScript dinonaktifkan. Sebagian besar pengguna akan meninggalkan Tor jika JavaScript dimatikan secara default karena akan menyebabkan banyak masalah bagi mereka. Pada akhirnya, kami ingin membuat Tor Browser seaman mungkin sementara juga membuat bermanfaat bagi sebagian orang, jadi untuk sekarang, ini berarti membuat JavaScript diaktifkan secara default.

For users who want to have JavaScript disabled on all HTTP sites by default, we recommend changing your Tor Browser's "Security Level" option. This can be done by navigating the Security icon (the small gray shield at the top-right of the screen), then clicking "Advanced Security Settings...". The "Standard" level allows JavaScript, but the "Safer" and "Safest" levels both block JavaScript on HTTP sites.

Please see the NoScript FAQ. If you believe this is a Tor Browser issue, please report it on our bug tracker.