
If you do NOT know how to connect your PC or MAC to the TOR network please read the following. It is basically an unofficial extension that is developed and maintained independently by its author.īefore using the addon please make sure your computer (PC or MAC) is connected to TOR. Important note: this addon does NOT belong or relate to Tor® project and has NO affiliations with Tor® anonymity software or website at all.

It’s a modified version of Firefox that’s configured to connect to sites through the Tor network.Onion Browser Button is a lite add-on that let you easily connect to TOR network in your browser (browse under TOR proxy). onion address, you’ll need to access it through the Tor Browser. But it’s a useful tool for anonymizing your Internet activity and bypassing censorship. You don’t necessarily want to use Tor all the time, as it’s slower than just browsing normally. This may be useful in countries that block Facebook, for example. This allows you to access Facebook through Tor, and your connection doesn’t ever leave Tor where it can be snooped on. It also means that someone hosting a website can hide that server using the Tor network, so no one can find it–in theory.įor example, Facebook maintains an official Tor hidden services address at “”. This means that your browsing activity can’t be snooped on by someone watching the Tor exit nodes. A “.onion” address points to a Tor hidden service, which is a server you can only access through Tor. RELATED: Is Tor Really Anonymous and Secure?īut that means that “last mile” of traffic can be snooped on by an organization monitoring or even running the exit nodes–especially if your traffic is unencrypted. Google sees this as the exit node’s IP address contacting it instead of your IP address. That exit node then contacts for you, and it sends you back the data Google responded with. So, when you access through Tor, your request bounces from Tor relay to Tor relay before it reaches an “exit node”. When you connect to Tor, your internet activity is sent through the Tor network, anonymizing your Internet activity so it can’t be snooped on, and so that you can access websites that may be blocked in your country. It’s partially funded by the US government, and is designed to help people in countries where Internet access may be censored or monitored. Tor–short for “the onion router”–is an anonymizing computer network.

RELATED: How to Browse Anonymously With Tor
