- Install Tor Browser using the official website or a Google Drive
- Verify the downloaded file using the signature file
- Download GPG4Win
- verify the installer on OSX using these commands:
gpg.exe --keyserver pool.sks-keyservers.net --recv-keys 0x4E2C6E8793298290 gpg.exe --fingerprint 0x4E2C6E8793298290 gpg.exe --verify [TOR .asc signature file]
- Download GPG Suite
- verify the installer on OSX using these commands:
gpg --keyserver pool.sks-keyservers.net --recv-keys 0x4E2C6E8793298290 gpg --fingerprint 0x4E2C6E8793298290 gpg --verify [TOR .asc signature file]
- Use Tor Bridges to be able to bypass the ISP filters against using Tor known nodes, you can also send an email to: [email protected] with the line “get bridges” by itself in the body of the mail and set it up here: about:preferences#tor this is just an example of how bridges look like, for more details have a look here
5.135.155.132:9001 FFC855D226D1AC20A9793DDA8AF6FFC8A7362964
185.142.215.8:5725 95B5C3EDF3E9B64122196F08B71B78BB9B6AE592
193.182.111.153:80 5F0BEBA9E58E039348D6CE2E53F98EDD1B074EBE
185.142.215.8:5725 95B5C3EDF3E9B64122196F08B71B78BB9B6AE592
193.182.111.153:80 5F0BEBA9E58E039348D6CE2E53F98EDD1B074EBE
- Use Pluggable Transport to obfuscate the traffic so the DPI will not detect Tor usage
- Set your security level (Standard, Medium, High) using the preferences page in the Tor Browser: about:preferences#privacy
- Verify your browser (to identify you there is only 33 bites of data needed) using this test