Friday, May 6, 2011

Tor Browser security Download free

Posted by OurTech Team | Friday, May 6, 2011 | Category: |

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser, and is self-contained. The Tor IM Browser Bundle additionally allows instant messaging and chat over Tor. If you would prefer to use your existing web browser, install Tor permanently, or if you don't use Windows, see the other ways to download Tor.
Freedom House has produced a video on how to find and use the Tor Browser Bundle. If you don't see a video below, view it at Youtube . Know of a better video or one translated into your language? Let us know!

Download click here

Tor Browser Bundle for Windows with Firefox 
click here or click here 
Freedom House has produced a video on how to find and use the Tor Browser Bundle. If you don't see a video below, view it at Youtube . Know of a better video or one translated into your language? Let us know!

The solution: a distributed, anonymous network

 Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.
To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.

Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.
For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.

Currently have 6 Comments:

  1. ؟؟؟؟؟؟؟؟؟؟؟؟؟؟؟

  2. شرح مبسط باللغة العربية لبرنامج تور للتصفح الآمن وتجاوز الحجب وروابط للتنزيل

    انضموا إلينا وشاركونا باقتراحاتكم
    الدعم التقني للثورة السورية

  3. في النسخ الحديثة من تور تم إلغاء تفعيل استخدام تور كبروكسي على بورت 8118, وبالتالي لم يعد بالإمكان ربط متصفحك العادي مع تور على هذا البورت من خلال إعدادات البروكسي, ورغم أنه لا يزال بالإمكان ربط المتصفح لديك مع تور باستخدام فقط إعدادات Socks5 Port 9050
    إلا أنها ليست طريقة منصوح بها وبالتجربة العملية استطعنا التأكد أن هذه الطريقة ليست آمنة حيث سيقوم المتصفح باستخدام اتصال مباشر بمزود (دي إن إس) من دون المرور ببروكسي تور مما قد يكشف أسماء المواقع التي تفتحها لمزود خدمة الانترنت المحلي بالإضافة إلى فتح الباب أمام أنواع من الإختراق التي قد يقوم بها مزود الخدمة المحلي
    الطريقة الآمنة لربط فايرفوكس مع تور هي باستخدام رزمة فيداليا

    وبالتالي استخدام تور الآمن يتم عبر إحدى الطريقتين التاليتين

    التصفح الآمن باستخدام تور - نسخة تور مع المتصفح

    الطريقة الآمنة لربط متصفحك مع تور - رزمة تور فيداليا

    كما نذكركم بإعدادات تور ليستخدم الجسور في حال تم حجبه

    Syrian Revolution Tech Support
    الدعم التقني للثورة السورية

  4. its not downloading it :/

  5. انا استفدت جدا من المعلومات هون بس في شوية تعقيد هل Hotspot Shield Launch بفي بالغرض ام لا الرجاء الاجابة

  6. يعني اذا حملتو على غوغل كروم مارح يشتغل

Leave a Reply