The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).



Internet users familiar with the underground community are likely to have heard the phrase “deep web”. It combines a set of websites and communications technologies which apply solely to the Tor network. This collective open-source software has blossomed into a revolutionary idea in just a few years.

On a similar note the bitcoins currency has also been gaining some attention. Although these two ideas are not correlated, they do fit together in the subject of underground web technology. Throughout this guide I’d like to introduce you to the topic of bitcoins, how they work, and their connection with the Tor network. Let’s first clarify what Tor is really about.


The original Tor network project isn’t as underground as it used to be. The open-source software was an effort to provide a new layer of Internet protection between the user and the remote website server, thus sheltering your privacy somewhat and providing you with a sense of security. This is accomplished by using 3 different relay proxies which re-direct you along a random path in the network.

Similar to Bit Torrent, users of the Tor network will keep their computers running 24/7 as a relay service. This means when you go to access a website on Tor it’ll pass your request through 3 different computers . This level of encryption ensures that no single computer within the proxy chain can determine your physical location and requested content. The official Tor FAQ contains more technical details if you’re interested.

This is crucial for users who prefers to keep their location and privacy unknown, individuals like whistleblowers or abuse victims. The fact that a wider variety of people now use Tor increases the level of security, helping you hide among the many other faceless users who are on the network.

Download tor browser here


This new technology is used within the Tor network to communicate hosts with dark net websites. These are still HTML/CSS pages which have been hosted on servers specifically targeting an. Onion DNS address. This TLD (Top-Level Domain) is actually similar to other country codes such as .us,, .es and others. However you are not accessing the same websites, as through an HTTP/FTP connection. The most intriguing part of the Onion routing network is within their unique URL addresses.

Step by step installation of tor browser click here.



Leave a Reply

Watch Dragon ball super