The better-anonymity tor install command automates the secure installation of the official Tor Browser:
- Fetches: Detects and downloads the latest release from
torproject.org. - Verifies GPG: Validates the download signature using the Tor Browser Developers' PGP key (
0xEF6E286DDA85EA2A4BA7DE684E2C6E8793298290). - Installs: Copies the application to
/Applications. - Verifies Integrity: checks the macOS code signature (Apple Developer ID
MADPSAYN6T).
To hide your Tor traffic from your ISP or local network administrator, you should use Pluggable Transports (Bridges).
Since the Tor Browser manages its own Tor instance, bridges must be configured within the application settings, not via external config files.
- Open Tor Browser.
- Go to Settings -> Connection.
- Under the "Bridges" section:
- Option A: Click "Choose a Bridge" to use a built-in bridge (e.g.,
obfs4). - Option B: Click "Request a Bridge" to fetch a new bridge from Tor Project.
- Option C: Click "Add a Bridge Manually" if you have obtained a private bridge line.
- Option A: Click "Choose a Bridge" to use a built-in bridge (e.g.,
- Web: Visit bridges.torproject.org
- Email: Send an email to
bridges@torproject.orgfrom a Gmail or Riseup address.
- obfs4: Makes Tor traffic look like random unencrypted TCP data. Good for general censorship circumvention.
- meek-azure: Makes Tor traffic look like it is connecting to a Microsoft service. Good for heavy censorship.
- Snowflake: Uses WebRTC ephemeral proxies.
- Do not modify the
torrcfile inside the bundle manually unless you know exactly what you are doing. - Do not install extensions. Tor Browser is carefully configured; adding extensions increases your fingerprint.