Tor can’t solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don’t want the sites you visit to see your identifying information. For example, you can use Tor Browser while browsing the web to withhold some information about your computer’s configuration.
Also, to protect your anonymity, be smart. Don’t provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.
Add the following entry in /etc/apt/sources.list
Add the gpg key used to sing the packages, type the following commands:
Update local repositories –
Install Tor –
Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).
Connecting to Tor Network
Tor Browser is ready
Tor is a great software that helps you to keep safe your privacy, and it has more capabilities, for example: if you want to visit and onion domain using just a simple web browser, you can’t do it; but if you’re using Tor, you can visit any website, even an onion domain.Also, you could be interested in another Tor related software:
Visit Tor project –