Introduction to Tor

Learn the fundamentals of the Tor network and how it enables anonymous browsing. This hands-on lab walks you through using Tor Browser on Tails OS to understand onion routing, circuit building, and the basics of anonymous communication.

BEGINNER
Estimated: 30 minutes
Type: GUI Desktop
Tasks: 6
XP: 110 XP
Sign in to start this lab
Sign In

Tasks

0 / 6 completed

Preview Mode

You can browse the tasks below. Sign in to track your progress and launch the lab machine.

Sign In to Start
1

Welcome to the Tor Network

🎯 Learning Objectives

  • Understand what Tor is and how it protects your anonymity
  • Learn the concept of onion routing
  • Navigate the Tor Browser interface
  • Verify your connection is routed through Tor

What is Tor?

Tor (The Onion Router) is a decentralized network designed to provide anonymity and privacy online. Originally developed by the U.S. Naval Research Laboratory, Tor is now maintained by the non-profit Tor Project.

💡 Key Concept: Tor works by encrypting your traffic multiple times and routing it through a series of volunteer-operated servers called "relays" or "nodes" - creating layers like an onion.

How Onion Routing Works:

🔐

Guard Node

Knows your IP, not your destination

🔁

Middle Relay

Passes traffic, knows neither end

🌐

Exit Node

Connects to destination, doesn't know you

Your First Steps:

  1. Click "Start Machine" above to launch your Tails environment
  2. Wait for the desktop to fully load (this may take 1-2 minutes)
  3. Look for the Tor Browser icon on the desktop or in the applications menu

Once the desktop is loaded, you're ready to explore Tor!

2

Launching Tor Browser

Opening Tor Browser on Tails

Tails comes with Tor Browser pre-installed and pre-configured. It's the default way to browse the web in Tails.

Launch Tor Browser:

  1. Look for the Tor Browser icon in the top panel (globe with onion)
  2. Or go to Applications → Tor Browser
  3. Or double-click the Tor Browser icon on the desktop

📍 The Tor Browser window will appear with the message:

"Connect to Tor successfully"

✨ Tails Advantage: Unlike using Tor Browser on a regular OS, in Tails ALL network traffic is forced through Tor - not just browser traffic. This provides system-wide anonymity.

What You'll See:

When Tor Browser opens, you'll see:

  • Purple/gray interface - distinguishes it from regular Firefox
  • Security Level indicator - shield icon in the toolbar
  • Onion circuit button - shows your connection path
  • DuckDuckGo - default privacy-focused search engine

Open Tor Browser now, then click Continue to proceed.

3

Verifying Your Tor Connection

Confirm You're Connected to Tor

Before exploring, it's crucial to verify that your traffic is actually being routed through Tor.

Visit the Tor Check Page:

In the Tor Browser address bar, type:

check.torproject.org

Press Enter and wait for the page to load.

✅ If Connected Successfully:

You'll see a green onion logo and a message starting with "Congratulations."

❌ If NOT Connected:

You'll see a red warning. This should NOT happen in Tails, but if it does, restart Tor Browser.

Your Task:

Visit check.torproject.org and enter the first word of the success message below:

4

Understanding Tor Circuits

Viewing Your Tor Circuit

Every connection through Tor uses a unique "circuit" - a path through multiple relays. You can view your current circuit in Tor Browser.

View Your Circuit:

  1. Click the onion icon (🧅) in the address bar
  2. Or click the padlock icon and select "Tor Circuit"
  3. A panel will show the countries your traffic passes through

Your computerGermany (Guard)Netherlands (Middle)Sweden (Exit)check.torproject.org

🔄 New Identity: You can request a new circuit by clicking "New Circuit for this Site" - useful if a site is blocking your current exit node.

Circuit Components:

Node Type Role
Guard/Entry First hop - knows your IP but not destination
Middle/Relay Passes traffic - knows neither endpoint
Exit Final hop - connects to destination

Your Task:

View your Tor circuit and count the number of relays (not including your computer or the destination). How many relays does a standard Tor circuit use?

5

Security Levels in Tor Browser

Adjusting Your Security Level

Tor Browser offers three security levels that balance usability with protection against potential attacks.

Access Security Settings:

  1. Click the shield icon 🛡️ in the toolbar
  2. Or go to Menu (≡) → Settings → Privacy & Security
  3. Scroll to "Security Level"

Standard

All features enabled. Best usability, lowest security.

Safer

JavaScript disabled on non-HTTPS. Some features limited.

Safest

JavaScript fully disabled. Many sites will break.

⚠️ Recommendation: For browsing .onion sites, consider using "Safer" or "Safest" mode. Many dark web sites work without JavaScript and disabling it protects against many attacks.

What Gets Disabled:

  • JavaScript - Can be used to fingerprint or attack you
  • Certain fonts - Can be used for fingerprinting
  • Media autoplay - Reduces attack surface
  • Some math rendering - Potential vulnerability vector

Experiment with different security levels to understand what breaks at each level. Click Continue when ready.

6

Lab Complete - Tor Fundamentals

🧅

Tor Fundamentals Complete!

You now understand the basics of anonymous browsing

📚 What You Learned:

  • How Tor uses onion routing to protect anonymity
  • The role of Guard, Middle, and Exit nodes
  • How to verify your Tor connection
  • How to view and understand Tor circuits
  • Security levels and when to use them

🔒 Key Security Takeaways:

  • Tor protects your location, not what you do online
  • Always verify you're connected before sensitive browsing
  • Higher security levels = better protection but less functionality
  • Never enable plugins like Flash or Java in Tor Browser
  • Don't torrent over Tor - it can leak your real IP

🚀 Next Steps:

🌐 Navigating the Dark Web

Learn to safely browse .onion sites and find legitimate resources.

💬 Secure Messaging with Pidgin

Set up encrypted instant messaging over Tor.

Remember: Anonymity is a tool for privacy, not a license for harm. Use Tor responsibly! 🧅

Lab Environment
Open in Tab