Portable Tor Browser 14.0.3
Tor Portable is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
The Tor Browser Portable lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
Surfing anonymously provides a powerful shield against network surveillance and traffic analysis. Protecting your online privacy can only be achieved by additional software tools that can hide your location and can prevent your online information and browsing habits from being revealed to anyone.
If you’re ever in need of such a tool, Tor Browser Portable is one suggestion you can add to the list. The application relies on a network of virtual servers in order to make your browsing sessions anonymous. Tor makes available a set of rules and algorithms that routes the communications through various servers all over the world. Thus, all the traffic is randomized so tracking the source becomes an almost impossible task.
Go online in a safe environment
The application’s main attempt is to put a web browser at your disposal with the help of which you can both enjoy a friendly interface and keep your system safe. All available features come in the form of a custom-made version of Mozilla Firefox, which is not necessarily bad because it lets you quickly accommodate.
A built-in addon for enhanced security
One of the key features in keeping your data safe the integrated HTTPS Everywhere addon, which basically encrypts communication between your computer and various web pages you access. This can easily be configured to allow or restrict access to specific content.
Carefully configure your connection type
Before being able to fully enjoy a safe browsing experience, the application requires you to select connection type. You can opt for a standard connection, which works in most cases, or configure settings in if you computer uses a proxy or goes through a firewall in order to reach the information superhighway.
Most available options are similar to the one you find in Firefox, with a few additions. The Torbutton puts several settings at your disposal, such as the possibility to fully configure connection settings, handle cookie protection, or even choose a new identity for enhanced security.
We advise the average user to consider using the Vidalia application, because the graphical interface puts you through a lesser ordeal than the command prompt version of Tor. When you first run Vidalia, it automatically connects to the Tor network and if the process is successful, a status will be displayed in the main window.
Vidalia’s interface encases a collection of shortcuts that allow you to stop the service, to start setting up the relays, to trigger a global view of the network and most important of all, it sports a button for using a new identity any time you wish. If you’re interested in bandwidth usage, Vidalia features a separate utility just for showing a bandwidth graph that measures the receive/send rate of the packets.
The portable Firefox version included in the download package is customized with a few extensions that make the anonymous surfing experience easier. These include: Torbutton – allows you to create a new identity each time you start a browsing session, NoScript – blocks scripts from untrusted domains and HTTPS Everywhere – enables you to encrypt the communication with a lot of popular sites.
With all the components it encases, Tor Browser Portable is one of the most trustworthy anonymous surfing tools out there. It can be configured from command prompt, run from its dedicated GUI controller – Vidalia and comes with a pre-configured web browser. Whichever of these methods you choose the result is a safe and controlled Internet browsing experience.
From downloading to using the most anonymous browser in the world only requires about 10 mouse clicks and 10 minutes to download, extract, and configure. When accepting default settings, which fits the needs of most users, the Tor browser configuration step is completed in one click