Tor 0.2.4.25 / 0.2.5.10 RC
Add it to your Download Basket!
Add it to your Watch List!
What's new in Tor 0.2.4.18 RC:
- Tor 0.2.4.18-rc is the fourth release candidate for the Tor 0.2.4.x series. It takes a variety of fixes from the 0.2.5.x branch to improve stability, performance, and better handling of edge cases.
- Major features:
- Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later. Resolves ticket 6055. (OpenSSL before 1.0.1 didn't have TLS 1.1 or 1.2, and OpenSSL from 1.0.1 through 1.0.1d had bugs that prevented renegotiation from working with TLS 1.1 or 1.2, so we had disabled them to solve bug 6033.)
- LICENSE TYPE:
- BSD License
- OUR RATING:
- DEVELOPED BY:
- Roger Dingledine and Nick Mathewson
- USER RATING:
- ROOT \ Internet \ Proxy
Defend yourself against traffic analyzers and network surveillance
When one says Tor, it may refer to the actual application or the entire network of computers that form this project. With Tor, users will be able to defend themselves against traffic analyzers and network surveillance.
The project protects your privacy and secures your top secret documents from pesky government institutions, such as NSA (National Security Agency). It prevents hackers from learning your browsing habits or discover your current location.
Supports mainstream web browsers and operating systems
It works well with any web browser, instant messaging client, and many other applications that access the network. It’s supported on Linux, Android, Microsoft Windows and Mac OS X operating systems.
How does it work?
In order to understand better how Tor works, you should know that when you are connected to the Tor network and you want to access a certain website with your favorite web browser, the connection will be redirected from one computer to another before it reaches its destination. Once the application is installed, configured and started, it will automatically route all the network traffic from your computer transparently over the Tor network.
Tor work as a distributed, anonymous network comprised of all the computers where it is installed and active. For example, if you install the application in your computer, you will automatically become part of the Tor virtual network, every time you use it. This way, no one will know your IP address, location, etc., and random IP address will be displayed to those who try to track you. It’s best to use Tor when you really want to hide your online activity from someone, but especially when you are in public networks.
Tor was reviewed by Marius Nestor, last updated on October 25th, 2014