Anonymizing software solution that can be used to prevent websites from tracking your activity or to connect to webpages that are usually blocked in your area

  Add it to your Download Basket!

 Add it to your Watch List!


Rate it!

What's new in Tor

  • It adds numerous safety, security, correctness, and performance improvements. Client programs can be configured to use more kinds of sockets, AutomapHosts works better, the multithreading backend is improved, cell transmission is refactored, test coverage is much higher, more denial-of-service attacks are handled, guard selection is improved to handle long-term guards better, pluggable transports should work a bit better, and some annoying hidden service performance bugs should be addressed.
  • Minor bug fixes (portability):
  • Use the correct datatype in the SipHash-2-4 function to prevent compilers from assuming any sort of alignment.
Read full changelog
send us
an update
3.6 MB
The Tor Project
4.1/5 266
Home \ Security
PART OF:   Hide IP download hub
 see alternatives
2 Tor Screenshots:
Tor - This is Tor started from the command line using the Mac OS X Terminal.Tor - Here you can view Tor's help message.
Privacy is a very important issue these days now that everyone is monitoring and analyzing internet traffic. Initially developed as a secure communication tool for the US Naval Research Laboratory, the Tor project has become a standard whenever you need to share information without compromising your identity.

Tor can be used to prevent websites from tracking your activity or to connect to webpages that are usually blocked in your area. Furthermore, you can publish websites without providing their location.

Tor can be installed and accessed via the command line, although the developers provide a Tor Browser Bundle that is more easy to use and set up. The drawback is that you remain protected only when you are using the Tor browser.

However, the Tor command line version is more efficient if you need to host certain services or if you want to be a volunteer and relay traffic to other users.

Start by installing Homebrew and then use the package manager to install Tor. Make sure that you also have Xcode with its development tools installed before proceeding.

Tor can be used with any application as long as you configure it properly and make sure the application’s internet connection goes through the Tor network. This means that you must set up the Tor client as the SOCKS proxy. If you are interested in application level anonymity, you can read the documentation provided by the Tor development team HERE.

Tor is a very efficient tool if you need to anonymize your internet traffic: by going through the Tor network, whoever is tracking your activity does not have access to the data header, which can disclose the package size, timing, the source and destination and so on.

All in all, Tor is essential whenever you want to communicate safely and maintain your privacy over the internet, no matter where you are, as long as it is configured properly.

Tor was reviewed by , last updated on March 25th, 2015

Runs on: Mac OS X (-)

feature list

#anonymize browsing #browser anonymizer #stealth browsing #anonymize #stealth #anonymizer #proxy

included in these download hubs

top FREE alternatives

Add your review!