Help support alternative media by visiting our advertisers

2021 Security Series (Part 3): TOR Browser – Install and Guidance for Use

Tor, a tool for using the internet anonymously

TOR Browser

TOR Browser – Install and Guidance for Use

By John Jacob Schmidt, Radio Free Redoubt

TOR (The Onion Router) provides secure web browsing, using layers (hence, ‘Onion’) by routing and rerouting your web traffic through encrypted nodes, hiding your identity and your location.  It is free and available in Windows, Mac, Linux, and Android.  It is also native on the TAILS Operating System (meaning, it is part of the TAILS package when you set that up).

Features of TOR as listed on the TOR Project website:



Click on the image above to go to the TOR Download page


SECURITY NOTE:  If you are using TOR in a life/death situation, I strongly recommend that you avoid using any system other than a Linux or TAILS or Raspberry Pi operating system, due to the security risks, keylogging, and other tracking/reporting that are inherent in other operating systems.  Windows 10 comes with a Keylogger program turned on by default.  You can disable it in your Privacy Settings, but I still don’t trust it.

Below are some of the best tutorials I’ve seen on downloading, setting up, and using TOR.  Using TOR does have some limitations and can give you a false sense of security if you don’t use it properly.  Be sure to take the time to visit the TOR Project Website to learn how to use TOR safely, securely, and anonymously.


There are also OS specific TOR tutorials for both Mac and Windows:



Here is some more useful information posted on INFOSEC BYTES Youtube Page covering TOR:

This is an introduction to Tor, a tool for using the internet anonymously. In this video we’re going to explain what Tor is and a little bit about how it works.

Be sure to check out our other videos on how to install and use Tor on Windows ( and Mac OS X (

Get Tor here:

Read more about how Tor works, exit nodes, and HTTPS:

To support the Center for Investigative Journalism with a donation, please visit And if you want to watch our other videos, please go to or subscribe to our channel



2021 Security Series (Part 1): Setting up TAILS Portable Secure Operating System

2021 Security Series (Part 2): Veracrypt – Installing, Setting Up, and Using Encrypted Data Storage

Employee Vax Resources and KeepassX, TOR, and OnionShare


The views, opinions, or positions expressed by the authors and those providing comments are theirs alone, and do not necessarily reflect the views, opinions, positions of Redoubt News. Social Media, including Facebook, has greatly diminished distribution of our content to our readers’ newsfeeds and is instead promoting Main Stream Media sources. This is called ‘Shadow-banning’. Please take a moment and consider sharing this article with your friends and family. Thank you. Please support our coverage of your rights. Donate here

(Visited 181 times, 1 visits today)