How To Setup TOR In Linux
What Is It?:
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.
Download the TOR package and open a terminal in Linux. Type “tar xzf tor-X.X.X.XX.tar.gz” without quotes *note X.X.X.X is the version number. Next, Change the working directory to the newly unzipped folder by typing “cd tor-X.X.X.XX” without quotes and press enter.
The next thing we need to do is make and configure our files type”/configure && make” without quotes and press enter. We are now ready to install and run TOR. After this we want to type “make install Tor” without quotes and press enter.
Make sure you have Privoxy To use the recently installed Tor on Linux, Privoxy must also be present. Privoxy does not come with the Linux package like it does with the Mac and Windows packages.
When using Tor there are a few items to consider. First, Tor does not anonymize all internet traffic when first installed. The only traffic Tor makes anonymous is the traffic from Firefox.
Other applications must be configured with proxies before they can use the Tor Network. Second, the Torbutton in Firefox blocks technologies that can potentially leak identity.
These include: Java, ActiveX, RealPlayer, QuickTime, and Adobe plug-in. To use Tor with these applications the settings file must be reconfigured.
Third, cookies present before Tor is installed may still give away the identity of the user. To make sure the user has complete anonymity, clear out all cookies before installing Tor.
Fourth, the Tor Network encrypts all data up until the exit router of the network. To fully protect your data users should use HTTPS or other trusted encryption.
And fifth, make sure to verify the integrity of all applications downloaded from Tor. Applications can potentially be a problem if a Tor router is compromised.
Thanks for reading, don’t be evil!