Tor Browser

  1. Install Tor Browser using the official website or a Google Drive
  2. Verify the downloaded file using the signature file
  • Download GPG4Win
  • verify the installer on OSX using these commands:
gpg.exe --keyserver pool.sks-keyservers.net --recv-keys 0x4E2C6E8793298290
gpg.exe --fingerprint 0x4E2C6E8793298290
gpg.exe --verify [TOR .asc signature file]
  • Download GPG Suite
  • verify the installer on OSX using these commands:
gpg --keyserver pool.sks-keyservers.net --recv-keys 0x4E2C6E8793298290
gpg --fingerprint 0x4E2C6E8793298290
gpg --verify [TOR .asc signature file]
  1. Use Tor Bridges to be able to bypass the ISP filters against using Tor known nodes, you can also send an email to: [email protected] with the line “get bridges” by itself in the body of the mail and set it up here: about:preferences#tor this is just an example of how bridges look like, for more details have a look here
5.135.155.132:9001 FFC855D226D1AC20A9793DDA8AF6FFC8A7362964
185.142.215.8:5725 95B5C3EDF3E9B64122196F08B71B78BB9B6AE592
193.182.111.153:80 5F0BEBA9E58E039348D6CE2E53F98EDD1B074EBE
  1. Use Pluggable Transport to obfuscate the traffic so the DPI will not detect Tor usage
  2. Set your security level (Standard, Medium, High) using the preferences page in the Tor Browser: about:preferences#privacy
  3. Verify your browser (to identify you there is only 33 bites of data needed) using this test