Differences between revisions 71 and 72
Revision 71 as of 2019-08-29 15:02:39
Size: 14165
Editor: RogerShimizu
Comment: Update to buster-backports and stretch-backports-sloppy release
Revision 72 as of 2019-12-31 06:27:49
Size: 13298
Comment: Rewrote most of the misconceptions for professionalism, lightly updated the rest of the page
Deletions are marked like this. Additions are marked like this.
Line 22: Line 22:
It might be in places like North Korea or ISIS-controlled Syria. In places like Rwanda or the USA it might make you a target of "law enforcement" authorities that don't give a fuck about law and are more concerned with silencing enemies of The System. In places like Germany, Hungary, Czech Republic or any other reasonably sane country, you'll be perfectly fine.

If you do live in a country that blocks Tor access, you can download Tor through the millions of mirror sites that exist. When using Tor, you can also use a bridge if they block (or monitor) tor network connections.

== The deep web is a dangerous place to browse, and you get hackers and viruses attacking you there ==

The deep web or dark net are really just terms that are used in scaremongering. What they really refer to, is all the networking that can't be accessed via Google. Think about this for a second: this includes company and school intranets; hell, any network that you have to log in to to access is included here. Once you realise this, you realise that it's not as bad as once thought. It's also not as big.

== There's nothing but child porn and illegal stuff on Tor ==

Firstly, people will continue to do this stuff regardless of whether or not Tor exists; people do it on the internet and in real life anyway, so this doesn't count. Secondly, Tor is also used by reporters, protesters, police officers, soldiers, and other people who just want to browse anonymously. Thirdly, there is that on clearnet just the same as on tor. Think of this: Everyday, drug smugglers use roads to transport their drugs. Does that make the roads themselves illegal?

Another thing to note is that a large number of child pornography hidden services are based in Russia, where the legal age of consent is 12. This makes it legal in its country of origin, however international law makes it complex to where you probably will get arrested if you view such content with intent. If you view it by accident (such as clicking a random link that was posted to a hidden services thread), you have not committed a crime if you can prove that was the reason. Usually they won't find you anyway though.
While in some extremely authoritarian countries, Tor may carry legal risk, it's generally fine. Through United States and most of Europe, the very worst you can expect is to be potentially put on a watchlist. Your ISP is unable to see what you're doing over Tor, but they can see that you're using Tor.

If your government or ISP attempts to block Tor, many mirror sites offer downloads of the browser bundle, and you may consider setting up [[DebianPkg:apt-transport-https]] to securely download it from the repositories. Tor bridges are also available in case connection to the network itself is censored.

== The deep web/dark web are dangerous to browse, and can expose you to hackers and malware ==

Though the terms are often used as synonyms, typically, the "deep web" refers to any website not indexed by search engines such as Google, and the "dark web" refers to websites that require a service such as Tor to view.

In both cases, neither are inherently dangerous. They carry the same risk as almost any small website, and require a vulnerability in your web browser to serve malware. As long as you update regularly, there's generally little risk.

== Tor is only used for illegal purposes ==

Don't confuse illegal with immoral. While Tor is used for plenty of terrible reasons as well, journalists, free speech activists, and whistleblowers all make use of Tor in order to do important work for the common good. Citizens of oppressive countries also make use of Tor in order to access important information that otherwise is restricted.

There are numerous legal reasons to use Tor as well, such as communicating with people across authoritarian borders, or accessing legal content that you nonetheless want to keep hidden from your ISP for whatever reason.
Line 38: Line 40:
Tor's speed comes from how many resources are provided by generous people. Also, [[https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea|Tor is not for torrenting over]]. Torrenting over Tor not only leaks your IP address, but it also slows the network for literally everyone else. Tor's speed comes from how many resources are provided by generous people. Also, [[https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea|Tor is not for torrenting]]. Torrenting over Tor not only leaks your IP address, but it also slows the network for everyone else.
Line 56: Line 58:
= Recommended install method =

Go to the [[https://www.torproject.org/|Tor Project]] website and click "Download" button. Next, select proper language and click "Download Linux 64-bit" in case you have 64-bit system or "Download Tor Browser" in case 32-bit installation. Unpack archive, go to folder containing Tor Browser and click Tor Browser icon. Now you can browse anonymously internet.
= Install from website =

Tarballs containing the latest stable version of the Tor Browser Bundle can be found on the official [[https://www.torproject.org/download/|Tor Browser website]], they contain a .desktop file that'll run the browser in-place. This can be run just by double-clicking it in most file managers. GNOME will require you to run the file from the terminal instead.

After being run, it will also auto-update in place as new versions are released.
Line 62: Line 66:
== Debian "experimental" ==

 1. If not already done [[https://wiki.debian.org/DebianExperimental#To_configure_APT|add the experimental repository to your sources.list]].
 {{{
printf "deb http://deb.debian.org/debian experimental main contrib" > /etc/apt/sources.list.d/experimental.list
apt update
}}}
== Debian "Sid" ==

Users of Debian [[DebianUnstable#Introduction|Sid (Unstable)]] can install torbrowser-launcher easily:
Line 72: Line 72:
apt install torbrowser-launcher -t experimental
}}}

== Debian "Sid" ==

Users of Debian [[DebianUnstable#Introduction|Sid (Unstable)]] can install torbrowser-launcher easily:

 1. Using Terminal as Root execute the following command
 {{{
Line 86: Line 77:
Steps to install Tor Browser on Debian 10 "Buster" ''with'' Backport Steps to install Tor Browser on Debian 10 "Buster" ''with Backports''
Line 135: Line 126:

==== Frequently Ask Questions (F.A.Q.) for Debian 8 "Jessie" ====

Any volunteer to edit this section?
Line 222: Line 209:
        * ''uBlock Origin'' is [[https://en.wikipedia.org/wiki/UBlock_Origin#uBlock_.28ublock.org.29|not to be confuse]] with ''uBlock''. As of May 2017 ''uBlock Origin'' is actively maintain and updated, compare to ''uBlock'' who has not been maintained or updated for more than 2 years, [[https://github.com/chrisaljoudi/ublock|since 2015]].         * ''uBlock Origin'' is [[https://en.wikipedia.org/wiki/UBlock_Origin#uBlock_.28ublock.org.29|not to be confused]] with ''uBlock''. As of May 2017 ''uBlock Origin'' is actively maintain and updated, compare to ''uBlock'' who has not been maintained or updated for more than 2 years, [[https://github.com/chrisaljoudi/ublock|since 2015]].

Introduction

Tor Browser protects your privacy while you are surfing the Internet: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

Tor Browser is based on Firefox and will be familiar to many users.

To keep your protection strong you need to update the Tor Browser regularly. In Debian the easier way to do that is to install Tor Browser using torbrowser-launcher, which automatically installs Tor Browser, run it, and update it to keep its protection strong and protect your privacy.

The advantage of using torbrowser-launcher over the manual installation of the TorBrowser package (called Tor Browser Bundle) is threefold:

  • You will benefit from automatic upgrades
  • If using AppArmor, you will benefit from the AppArmor profiles contained in the package

  • Program launchers and menu entries will be created for you automatically

Common misconceptions

Tor is illegal to use

While in some extremely authoritarian countries, Tor may carry legal risk, it's generally fine. Through United States and most of Europe, the very worst you can expect is to be potentially put on a watchlist. Your ISP is unable to see what you're doing over Tor, but they can see that you're using Tor.

If your government or ISP attempts to block Tor, many mirror sites offer downloads of the browser bundle, and you may consider setting up apt-transport-https to securely download it from the repositories. Tor bridges are also available in case connection to the network itself is censored.

The deep web/dark web are dangerous to browse, and can expose you to hackers and malware

Though the terms are often used as synonyms, typically, the "deep web" refers to any website not indexed by search engines such as Google, and the "dark web" refers to websites that require a service such as Tor to view.

In both cases, neither are inherently dangerous. They carry the same risk as almost any small website, and require a vulnerability in your web browser to serve malware. As long as you update regularly, there's generally little risk.

Tor is only used for illegal purposes

Don't confuse illegal with immoral. While Tor is used for plenty of terrible reasons as well, journalists, free speech activists, and whistleblowers all make use of Tor in order to do important work for the common good. Citizens of oppressive countries also make use of Tor in order to access important information that otherwise is restricted.

There are numerous legal reasons to use Tor as well, such as communicating with people across authoritarian borders, or accessing legal content that you nonetheless want to keep hidden from your ISP for whatever reason.

It's too slow to stream/torrent over

Tor's speed comes from how many resources are provided by generous people. Also, Tor is not for torrenting. Torrenting over Tor not only leaks your IP address, but it also slows the network for everyone else.

I'll get arrested or get into trouble with my ISP or someone else for running Tor

You will only need to worry about this if you are running a Tor exit node. There are also some excellent resources created by the Tor staff; give them a read:

You may also be interested in the Tor Metrics pages which will show you how common the use of Tor is in your country:

Source: https://wiki.installgentoo.com/index.php/Tor

Install from website

Tarballs containing the latest stable version of the Tor Browser Bundle can be found on the official Tor Browser website, they contain a .desktop file that'll run the browser in-place. This can be run just by double-clicking it in most file managers. GNOME will require you to run the file from the terminal instead.

After being run, it will also auto-update in place as new versions are released.

Install from official repository

Debian "Sid"

Users of Debian Sid (Unstable) can install torbrowser-launcher easily:

  1. Using Terminal as Root execute the following command
    apt install torbrowser-launcher

Debian 10 "Buster"

Steps to install Tor Browser on Debian 10 "Buster" with Backports

  1. If not already done add the Backport repository to your sources.list.

    printf "deb http://deb.debian.org/debian buster-backports main contrib" > /etc/apt/sources.list.d/buster-backports.list
    apt update
  2. Using Terminal as Root execute the following command
    apt install torbrowser-launcher -t buster-backports
  3. To open Tor Browser choose one of the following two options
    • Option 1: Using GNOME, open the Activities Search. Simply type in Tor Browser

    • Option 2: Using Terminal as user run the following command

    torbrowser-launcher
  4. The first time you open Tor Browser the new version will automatically be downloaded and installed. On every subsequent open a check for updates will be done, and Tor Browser will automatically be updated to the latest available version from the Backport repository.

Debian 9 "Stretch"

Steps to install Tor Browser on Debian 9 "Stretch" with Backport

  1. If not already done add the Backport repository to your sources.list.

    printf "deb http://deb.debian.org/debian stretch-backports main contrib\n" > /etc/apt/sources.list.d/stretch-backports.list
    printf "deb http://deb.debian.org/debian stretch-backports-sloppy main contrib" >> /etc/apt/sources.list.d/stretch-backports.list
    apt update
  2. Using Terminal as Root execute the following command
    apt install torbrowser-launcher -t stretch-backports-sloppy
  3. To open Tor Browser choose one of the following two options
    • Option 1: Using GNOME, open the Activities Search. Simply type in Tor Browser

    • Option 2: Using Terminal as user run the following command

    torbrowser-launcher
  4. The first time you open Tor Browser the new version will automatically be downloaded and installed. On every subsequent open a check for updates will be done, and Tor Browser will automatically be updated to the latest available version from the Backport repository.

Debian 7 / 8 / "Wheezy" / "Jessie"

torbrowser-launcher in wheezy-backports / jessie-backports is currently outdated.

<!> To keep your computer secure it is suggested to upgrade to Debian 10 "Buster" at your earliest convenience.

Update

To update choose one of the following two options. If unsure, the "automatic update" option is easier and recommended.

Automatic update

Tor Browser will automatically prompt you to update the software once a new version has been released. The Torbutton icon will display a small yellow triangle. When you are prompted to update Tor Browser:

  1. Click on the Torbutton icon
  2. Select “Check for Tor Browser Update” option. If needed see those screenshots to clarify the location.

  3. When Tor Browser has finished checking for updates, click on the “Update” button.
  4. Wait for the update to download and install, then restart Tor Browser. You will now be running the latest version.

Alternatively, if you installed Tor Browser using the torbrowser-launcher package. Simply close all Tor Browser windows. Then re-open Tor Browser. It will automatically check if a new version is available. Follow the instructions on your screen.

Manual update

Before manually updating Tor Browser it is suggested to periodically backup any valuable data. Such as your bookmarks. Which you could import after the manual update.

Manually update Tor Browser

  1. When you are prompted to update Tor Browser, finish the browsing session and close the program.
  2. Remove Tor Browser from your system by deleting the folder that contains it. If needed see that Uninstalling section for more information.

  3. Visit https://www.torproject.org/projects/torbrowser.html.en and download a copy of the latest Tor Browser release, then install it as before.

Advanced Tor Usage

Torrc File Location

If you installed "torbrowser-launcher" on a 64 bit system, the "torrc" advanced configuration file is located at:

  • ~/.local/share/torbrowser/tbb/x86_64/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc

If you installed "torbrowser-launcher" on a i686 bit system, the "torrc" advanced configuration file is located at:

  • ~/.local/share/torbrowser/tbb/i686/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc

Related documentation

AppArmor confinement and Xserver isolation

HolgerLevsen has written some scripts which are available in /usr/share/doc/torbrowser-launcher/examples/ if you have installed the package.

These scripts show how to run torbrowser-launcher (and thus torbrowser), confined with AppArmor, in Xephyr (a virtual Xserver running on another Xserver) as another user. This, using AppArmor and Xephyr, shall have two effects:

  • the browser process (and it's subprocesses) can - thanks to AppArmor confinement - only access a tiny part of the filesystem

  • the real Xserver is not exposed to the browser application, so hopefully that application cannot exploit bugs to grab keyboard input from other applications.

In order to use these scripts, please refer to /usr/share/doc/torbrowser-launcher/examples/.

You can also read those scripts here if interested: https://anonscm.debian.org/git/pkg-privacy/packages/torbrowser-launcher.git/tree/debian/examples?h=debian/sid

Bugs and known issues

See also

References


CategorySoftware | CategoryNetworkApplication | CategoryWebBrowser