Tor Browser: An Ultimate Web Browser for Anonymous Web Browsing in Linux

Most of us give a considerable time of ours to Internet. The primary Application we require to perform our internet activity is a browser, a web browser to be more perfect. Over Internet most of our’s activity is logged to Server/Client machine which includes IP address, Geographical Location, search/activity trends and a whole lots of Information which can potentially be very harmful, if used intentionally the other way.

Install Tor Browser in Linux

Tor Browser: Anonymous Browsing

Moreover the National Security Agency (NSA) aka International Spying Agency keeps tracks of ours digital footprints. Not to mention a restricted proxy server which again can be used as data ripping server is not the answer. And most of the corporates and companies wont allow you to access a proxy server.

So, what we need here is an application, preferably small in size and let it be standalone, portable and which servers the purpose. Here comes an application – the Tor Browser, which has all the above discussed features and even beyond that.

In this article we will be discussing Tor browser, its features, its usages and Area of Application, Installation and other important aspects of The Tor Browser Application.

What is Tor Browser?

Tor is a Freely distributed Application Software, released under BSD style Licensing which allows to surf Internet anonymously, through its safe and reliable onion like structure. Tor previously was called as ‘The Onion Router‘ because of its structure and functioning mechanism. This Application is written in C programming Language.

Features of Tor Browser

  1. Cross Platform Availability. i.e., this application is available for Linux, Windows as well as Mac.
  2. Complex Data encryption before it it sent over Internet.
  3. Automatic data decryption at client side.
  4. It is a combination of Firefox Browser + Tor Project.
  5. Provides anonymity to servers and websites.
  6. Makes it possible to visit locked websites.
  7. Performs task without revealing IP of Source.
  8. Capable of routing data to/from hidden services and application behind firewall.
  9. Portable – Run a pre-configured web browser directly from the USB storage Device. No need to install it locally.
  10. Available for architectures x86 and x86_64.
  11. Easy to set FTP with Tor using configuration as “socks4a” proxy on “localhost” port “9050”
  12. Tor is capable of handling thousands of relay and millions of users.

How Tor Browser Works?

Tor works on the concept of Onion routing. Onion routing resemble to onion in structure. In onion routing the layers are nested one over the other similar to the layers of onion. This nested layer is responsible for encrypting data several times and sends it through virtual circuits. On the client side each layer decrypt the data before passing it to the next level. The last layer decrypts the innermost layer of encrypted data before passing the original data to the destination.

In this process of decryption all the layers function so intelligently that there is no need to reveal IP and Geographical location of User thus limiting any chance of anybody watching your internet connection or the sites you are visiting.

All these working seems a bit complex, but the end user execution and working of Tor browser is nothing to worry about. In-fact Tor browser resembles any other browser (Especially Mozilla Firefox) in functioning.

Installation of Tor Browser in Linux

As discussed above, Tor browser is available for Linux, Windows and Mac. The user need to download the latest version (i.e. Tor Browser 8.0.3) application from the link below as per their system and architecture.


After downloading the Tor browser, we need to install it. But the good thing with ‘Tor’ is that we don’t need to install it. It can run directly from a Pen Drive and the browser can be pre-configured. That means plug and Run Feature in perfect sense of Portability.

After downloading the Tar-ball (*.tar.xz) we need to Extract it.

On 32-Bit System
$ wget
$ tar xpvf tor-browser-linux32-8.0.3_en-US.tar.xz
On 64-Bit System
$ wget
$ tar -xpvf tor-browser-linux64-8.0.3_en-US.tar.xz 

Note : In the above command we used ‘$‘ which means that the package is extracted as user and not root. It is strictly suggested to extract and run tor browser not as root.

After successful extraction, we can move the extracted browser to anywhere/USB Mass Storage device. And run the application from the extracted folder and run ‘start-tor-browser’ strictly not as root.

$ cd tor-browser_en-US
$ ./start-tor-browser
Starting Tor Browser

Starting Tor Browser

1. Trying to connect to the Tor Network. Click “Connect” and Tor will do rest of the settings for you.

Connecting to Tor Network

Connecting to Tor Network

2. The welcome Window/Tab.

Tor Welcome Screen

Tor Welcome Screen

3. Tor Browser Running a Video from Youtube.

Watching Video on Youtube

Watching Video on Youtube

4. Opening a banking site for online Purchasing/Transaction.

Browsing a Banking Site

Browsing a Banking Site

5. The browser showing my current proxy IP. Note that the text that reads “Proxy Server detected”.

Checking IP Address

Checking IP Address

Note: That you need to point to the Tor startup script using text session, everytime you want to run Tor. Moreover a terminal will be busy all the time till you are running tor. How to overcome this and create a desktop/dock-bar Icon?

6. We need to create tor.desktop file inside the directory where extracted files resides.

$ touch tor.desktop

Now edit the file using your favourite editor with the text below. Save and exit. I used nano.

$ nano tor.desktop 
#!/usr/bin/env xdg-open
[Desktop Entry]
Comment=Anonymous Browse

Note: Make sure to replace the path with the location of your tor browser in the above.

7. Once done! Double click the file tor.desktop to fire Tor browser. You may need to trust it for the first time.

Tor Application Launcher

Tor Application Launcher

8. Once you trust you might note that the icon of tor.desktop changed.

Tor icon Changed

Tor icon Changed

9. You may drag and drop the tor.desktop icon to create shortcut on Desktop and Dock Bar.

Add Tor Shortcut on Desktop

Add Tor Shortcut on Desktop

10. About Tor Browser.

About Tor Browser

About Tor Browser

Note: If you are using older version of Tor, you may update it from the above window.

Usability/Area of Application

  1. Anonymous communication over web.
  2. Surf to Blocked web Pages.
  3. Link other Application Viz (FTP) to this secure Internet Browsing Application.

Controversies of Tor-browser

  1. No security at the boundary of Tor Application i.e., Data Entry and Exit Points.
  2. A study in 2011 reveals that a specific way of attacking Tor will reveal IP address of BitTorrent Users.
  3. Some protocols shows the tendency of leaking IP address, revealed in a study.
  4. Earlier version of Tor bundled with older versions of Firefox browser were found to be JavaScript Attack Vulnerable.
  5. Tor Browser Seems to Work slow.

Real world Implementation of Tor-browser

  1. Vuze BitTorrent Client
  2. Anonymous Os
  3. Os’es from Scratch
  4. whonix, etc.

Future of Tor Browser

Tor browser is promising. Perhaps the first application of its kind is implemented very brilliantly. Tor browser must invest for Support, Scalability and research for securing the data from latest attacks. This application is need of the future.

Download Free eBook

Unofficial Guide to Tor Private Browsing


Tor bowser is a must tool in the present time where the organization you are working for don’t allow you to access certain websites or if you don’t want others to look into your private business or you don’t want to provide your digital footprints to NSA.

Note: Tor Browser don’t provide any safety from Viruses, Trojans or other threats of this kind. Moreover by writing an article of this we never mean to indulge into illegal activity by hiding our identity over Internet. This Post is totally for educational Purpose and for any illegal use of it neither the author of the post nor Tecmint will be responsible. It is the sole responsibility of user.

Tor-browser is a wonderful application and you must give it a try. That’s all for now. I’ll be here again with another interesting article you people will love to read. Till then stay tuned and connected to Tecmint. Don’t forget to provide us with your value-able feedback in our comment section below.

If You Appreciate What We Do Here On TecMint, You Should Consider:

TecMint is the fastest growing and most trusted community site for any kind of Linux Articles, Guides and Books on the web. Millions of people visit TecMint! to search or browse the thousands of published articles available FREELY to all.

If you like what you are reading, please consider buying us a coffee ( or 2 ) as a token of appreciation.

Support Us

We are thankful for your never ending support.

RedHat RHCE and RHCSA Certification Book
Linux Foundation LFCS and LFCE Certification Preparation Guide

You may also like...

9 Responses

  1. dragonmouth says:

    “Moreover the National Security Agency (NSA) aka International Spying Agency keeps tracks of ours digital footprints.”

    Let’s not single out the NSA. GHCQ in United Kingdom and other governments’ security agencies also do a very good job of spying and keeping track of people’s digital footprints. Just because you happen to live outside the United States don’t labor under the illusion that YOUR electronic activities are not being tracked by your government.

  2. postmaster says:
    $ sudo apt install torbrowser-launcher
  3. Joseph says:

    Since i heard the benefits of Tor, I’ve also heard how harmful tor can be. I still make use of it though. Would like to know any alternative to tor.

  4. Stanley says:

    Tor seems too fishy to me. Instead of using Tor, I’d definitely choose the cheapest VPN like Hide My IP, which at least hides all online activity. On the other hand, Tor keeps cutting and lags a lot.

  5. Stephen Ausledder says:

    Do you mean 64-bit. It reads 62 bit and I’m not skilled enough to know whether this is some strange mistake or something that matters. I do know I have a 64 bit OS.

  6. Rajkiran Parasnis says:

    Great job..Surely will give this browser a try…

  7. Shaunx says:

    Great job man~

Got something to say? Join the discussion.

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.