Introduction to Tor
Learn the fundamentals of the Tor network and how it enables anonymous browsing. This hands-on lab walks you through using Tor Browser on Tails OS to understand onion routing, circuit building, and the basics of anonymous communication.
Tasks
0 / 6 completedPreview Mode
You can browse the tasks below. Sign in to track your progress and launch the lab machine.
Sign In to StartWelcome to the Tor Network
🎯 Learning Objectives
- Understand what Tor is and how it protects your anonymity
- Learn the concept of onion routing
- Navigate the Tor Browser interface
- Verify your connection is routed through Tor
What is Tor?
Tor (The Onion Router) is a decentralized network designed to provide anonymity and privacy online. Originally developed by the U.S. Naval Research Laboratory, Tor is now maintained by the non-profit Tor Project.
💡 Key Concept: Tor works by encrypting your traffic multiple times and routing it through a series of volunteer-operated servers called "relays" or "nodes" - creating layers like an onion.
How Onion Routing Works:
Guard Node
Knows your IP, not your destination
Middle Relay
Passes traffic, knows neither end
Exit Node
Connects to destination, doesn't know you
Your First Steps:
- Click "Start Machine" above to launch your Tails environment
- Wait for the desktop to fully load (this may take 1-2 minutes)
- Look for the Tor Browser icon on the desktop or in the applications menu
Once the desktop is loaded, you're ready to explore Tor!
Launching Tor Browser
Opening Tor Browser on Tails
Tails comes with Tor Browser pre-installed and pre-configured. It's the default way to browse the web in Tails.
Launch Tor Browser:
- Look for the Tor Browser icon in the top panel (globe with onion)
- Or go to Applications → Tor Browser
- Or double-click the Tor Browser icon on the desktop
📍 The Tor Browser window will appear with the message:
"Connect to Tor successfully"
✨ Tails Advantage: Unlike using Tor Browser on a regular OS, in Tails ALL network traffic is forced through Tor - not just browser traffic. This provides system-wide anonymity.
What You'll See:
When Tor Browser opens, you'll see:
- Purple/gray interface - distinguishes it from regular Firefox
- Security Level indicator - shield icon in the toolbar
- Onion circuit button - shows your connection path
- DuckDuckGo - default privacy-focused search engine
Open Tor Browser now, then click Continue to proceed.
Verifying Your Tor Connection
Confirm You're Connected to Tor
Before exploring, it's crucial to verify that your traffic is actually being routed through Tor.
Visit the Tor Check Page:
In the Tor Browser address bar, type:
check.torproject.org
Press Enter and wait for the page to load.
✅ If Connected Successfully:
You'll see a green onion logo and a message starting with "Congratulations."
❌ If NOT Connected:
You'll see a red warning. This should NOT happen in Tails, but if it does, restart Tor Browser.
Your Task:
Visit check.torproject.org and enter the first word of the success message below:
Understanding Tor Circuits
Viewing Your Tor Circuit
Every connection through Tor uses a unique "circuit" - a path through multiple relays. You can view your current circuit in Tor Browser.
View Your Circuit:
- Click the onion icon (🧅) in the address bar
- Or click the padlock icon and select "Tor Circuit"
- A panel will show the countries your traffic passes through
Your computer → Germany (Guard) → Netherlands (Middle) → Sweden (Exit) → check.torproject.org
🔄 New Identity: You can request a new circuit by clicking "New Circuit for this Site" - useful if a site is blocking your current exit node.
Circuit Components:
| Node Type | Role |
|---|---|
| Guard/Entry | First hop - knows your IP but not destination |
| Middle/Relay | Passes traffic - knows neither endpoint |
| Exit | Final hop - connects to destination |
Your Task:
View your Tor circuit and count the number of relays (not including your computer or the destination). How many relays does a standard Tor circuit use?
Security Levels in Tor Browser
Adjusting Your Security Level
Tor Browser offers three security levels that balance usability with protection against potential attacks.
Access Security Settings:
- Click the shield icon 🛡️ in the toolbar
- Or go to Menu (≡) → Settings → Privacy & Security
- Scroll to "Security Level"
Standard
All features enabled. Best usability, lowest security.
Safer
JavaScript disabled on non-HTTPS. Some features limited.
Safest
JavaScript fully disabled. Many sites will break.
⚠️ Recommendation: For browsing .onion sites, consider using "Safer" or "Safest" mode. Many dark web sites work without JavaScript and disabling it protects against many attacks.
What Gets Disabled:
- JavaScript - Can be used to fingerprint or attack you
- Certain fonts - Can be used for fingerprinting
- Media autoplay - Reduces attack surface
- Some math rendering - Potential vulnerability vector
Experiment with different security levels to understand what breaks at each level. Click Continue when ready.
Lab Complete - Tor Fundamentals
Tor Fundamentals Complete!
You now understand the basics of anonymous browsing
📚 What You Learned:
- How Tor uses onion routing to protect anonymity
- The role of Guard, Middle, and Exit nodes
- How to verify your Tor connection
- How to view and understand Tor circuits
- Security levels and when to use them
🔒 Key Security Takeaways:
- Tor protects your location, not what you do online
- Always verify you're connected before sensitive browsing
- Higher security levels = better protection but less functionality
- Never enable plugins like Flash or Java in Tor Browser
- Don't torrent over Tor - it can leak your real IP
🚀 Next Steps:
🌐 Navigating the Dark Web
Learn to safely browse .onion sites and find legitimate resources.
💬 Secure Messaging with Pidgin
Set up encrypted instant messaging over Tor.
Remember: Anonymity is a tool for privacy, not a license for harm. Use Tor responsibly! 🧅