The Ultimate Guide on Tor Browser (With Important Tips) 2018

Tor brings anonymity to you with their browser. Features, pros, and how to make it work even better with a VPN — get the full scoop with our guide!


Tor recently released a new layer of security. The new changes include encryption algorithms, improved authentication, and a redesigned directory system. On top of that, the new onion domains will be longer to keep onion addresses completely private.

First things first: What is Tor?

If you’ve landed on this post, chances are you’ve heard of Tor and are wondering if you should use it. So let’s start with the basics: just what is Tor anyway?

Tor is short for “The Onion Router,” which refers to the multiple layers of encryption used to protect your privacy. Tor’s basic function is that it hides your internet footprint, allowing you to browse the web and download anonymously.

But let’s be clear, Tor is not a VPN or a browser with a built-in VPN. While both Tor and VPN allow for private internet browsing, they are very different technologies.

Tor was originally developed by the U.S. Navy to protect U.S. government communications during intelligence operations. It’s now a non-profit organization to promote online privacy.

How does Tor work?

Now that you know what Tor is, let’s look at how it works — and how to use it.

Using Tor is relatively easy.

You simply download and install the Tor Browser, which would replace Chrome, Firefox, or whatever browser you normally use. Anything you do on the Tor browser is then private and secure.

Tor bundles your data into encrypted packets before it enters the network. Tor then removes the part of the packet that contains information like the source, size, destination, and timing, all of which can be used to learn about the sender (that’d be you.)

Next, it encrypts the rest of the bundled information before finally sending the encrypted data through many different servers, or relays, at random so that it can’t be tracked.

Each relay decrypts and then re-encrypts just enough data to know where it came from and where it’s going next, but can’t track the information beyond that.

The many layers of encryption Tor uses to ensure anonymity are similar to an onion, hence the name. The illustration below is a good (albeit very simplified) explanation of how Tor works.

Why use Tor?

The Tor network conceals your identity by moving your internet activity through different Tor servers.

It allows for complete anonymity and security from anyone trying to track your activity, like governments, hackers, and advertisers.

Tor is also a gateway into the “Deep Web” or “Dark Web,” which sounds creepier than it is. In fact, the Deep Web comprises most of the internet.

The deep Web is made up of websites that haven’t registered with any of the search engines for one reason or another.

While many of them haven’t registered on accident, some purposely haven’t registered because they don’t want to be easily found. For example, Silk Road, the online drug trafficking marketplace that was shut down a few years ago, couldn’t be accessed by normal web browsers.

A popular analogy to describe the Deep Web is an iceberg: what is searchable through standard search engines is only the tip, while the rest of the internet, or Deep Web, is what’s below the surface.

But Tor isn’t just for illegal activities on the web. It’s also very popular with journalists, activists, human rights workers, and whistleblowers, especially those who live or work in countries with internet restrictions.

Tor not only hides internet activity, it also helps bypass censorship. For example, Edward Snowden released information via Tor.

Why not use Tor?

The biggest drawback to Tor is its performance—or lack-there-of.

Because data goes through so many relays, Tor is very sluggish, especially for audio and video. This can make streaming or downloading a nightmare and is one of the main reasons using a VPN or a browser with a built-in VPN makes more sense for most users.

It’s also important to know that using Tor does not make you 100% invulnerable.

In fact, many believe Tor to be fairly easily hackable, as exit nodes (the last relay before your information reaches its destination) can see your traffic if the site you’re accessing does not use SSL. Using HTTPS instead of just HTTP can add an extra layer of protection, but it’s still not fool-proof.

Last, government agencies can see if you are using Tor, so even if they can’t see what you’re doing, it can still be a red flag to them.

Using Tor with VPN

Tor and VPN can be used in conjunction with each other, though the relationship is a bit complex. You can do Tor over VPN or VPN  over Tor, and there is a big difference between the two.

We won’t get too technical, but it’s important to understand the pros and cons of each. Also, be aware that no matter which set-up you use, it will significantly reduce your performance.

Both Tor and VPN slow down internet speed, and combining the two makes that even more noticeable.

Tor over VPN

In a Tor over VPN connection you will first have to connect the VPN to mask your identity from your ISP, then you can load up your Tor browser and connect to the internet.

The benefit of this is that you will be able to hide your Tor browsing from your ISP. In addition to remaining hidden from the ISP, the Tor entry nodes will not be able to track you via your IP address. By staying anonymous from these two entities you will have created a very solid layer of security.

Of course, nothing is perfect and by connecting to Tor through your VPN, will give the VPN provider your actual IP address, and you will not have the opportunity to stop malicious Tor exit nodes from harming your computer.

While we admit that this method isn’t as secure as using the end to end encryption that you would enjoy with VPN - through - Tor, you do have more choices of VPNs that are compatible connecting with Tor in the method.

After testing our favorite VPNs with TOR, our top 3 Tor over VPN are:

1. NordVPN
2. ExpressVPN
3. CyberGhost

VPN over Tor

To set-up the VPN over Tor connection you first have to adjust the settings in your VPN to work with Tor. Then you’ll be able to connect directly to Tor, which will anonymize you before you get online. Once you’ve connected to Tor, you can turn on your VPN and mask your IP address.
VPN over Tor is significantly more secure, providing almost perfect anonymity.

If you want to utilize this option, then you only have two VPN provides to choose from that allow you to connect in this manner; AirVPN and BolehVPN.

For sure, if you don’t mind being restricted to which VPN you can use, VPN over Tor is better.

The obvious benefit is that you will protect your anonymity from your VPN provider, the only information they will have is the IP for the Tor exit nodes. If you are going this far, you should pay with Bitcoin via the Tor browser, which means the VPN provider really has no way of identifying you, even if it keeps logs.

You will also be protected from malicious Tor exit nodes, since your data is protected by the VPN.

This also has the added effect of bypassing any blocks on Tor exit nodes (such as censorship) which the Tor over VPN setup can’t do.

All of that said, if you don’t want to go through the hassle of running VPN over Tor, you can always run Tor over VPN by simply running the Tor browser after your VPN connection has been established.

How to use Tor

To get started, download the Tor browser, which is actually a modified version of Firefox. From here, you can take the precautionary step of verifying the package signature -which protects you from receiving a malicious version.

The next step is to install the Tor browser, which automatically installs to your desktop.

Tor is a portable software that doesn’t integrate into Windows, meaning you can run the browser from anywhere on your computer, even a USB drive.

If you want to change the installation location from your desktop, simply click Browse and choose your destination from there. From here, the installation process is just like any other.

To use Tor with a VPN or proxy:

Once the browser is installed, it will create a folder called "Tor Browser" in your chosen destination. Inside, you will see "Start Tor Browser."

When you click it you'll see an option to connect directly to the Tor Network or to configure proxy settings first. If you are using the Vpn-through-Tor method or using a proxy, (or if you are connected to a network that is monitored, censored or limited in any way), you will need to configure manually using the second option.

Regardless, once you’re in the Tor Browser, make sure you’re properly connected by going to an IP address checker. If it’s not your original IP, you’re good to go!

Once you are in, here are some tips for added security:

  • Only go to sites that are HTTPS, not HTTP. While Tor encrypts all traffic within the Tor network, it doesn’t encrypt traffic outside the network, leaving you vulnerable once your traffic reaches the exit nodes, since your data is no longer encrypted.That’s why you should always use end-to-end encryption like SSL or TLS, as well as sites that use HTTPS. To be sure you’re only using HTTPS sites, consider using the HTTPS Everywhere plugin.
  • Do not use P2P traffic in Tor. Tor is not built for peer-to-peer file sharing and will likely actually be blocked by many exit nodes.Using P2P traffic on Tor threatens your online anonymity as BitTorrent clients send your IP address to the BitTorrent trackers and other peers.
  • Always delete cookies- You can use an add-on such as Self-Destructing Cookies to automatically delete cookies.
  • Do not use your real e-mail- It should be obvious but consider this a reminder. As one website puts it, using your real email while using Tor is like “going to a mask party but wearing your name tag on your costume.”
  • Do not use Google- Google is infamous for collecting information on the browsing habits and search data of its users to help grow its ad revenue. Instead, use search engines like DuckDuckGo.

Final thoughts on Tor

Personal privacy has become increasingly elusive as the government, hackers, and even our beloved Google have come up with more advanced ways to hack and track us. Even with its known flaws and vulnerabilities, Tor browser is an excellent step towards being more anonymous online. It is, however, only one piece of the puzzle.

If you truly want to protect yourself, consider one of the VPNs below in conjunction with Tor browser.

Our Score

About the Author


  • Views: 8,223,671
  • Posts: 779
Follow our experts
Best VPNs by Category
  • Best VPNs Overall
  • Best VPNs for Torrents
  • Best VPNs for Windows
  • Best VPNs for Android
  • Best VPNs for Mac
  • Best VPNs for iOS
  • Best VPNs for USA
VPN Blog Posts