Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

6 useful steps for installing The Tor browser on your computer

The Tor browser promotes anonymity

Tor browser is one of the most famous anonymity tools used by at-risk groups of people. Anonymity is key for people who may be at risk of being put under surveillance, facing hacking, and a possibility of what they search putting them into trouble. In this article, I will be taking you through the steps of installing the Tor browser on your computer and later on place emphasis on phone installation.

Dissecting the Tor browser
An Icon for the Tor browser

The Tor Browser could be new to some people’s faces, so I want to give further details about the browser’s features. The browser has the following features

Block trackers. The browser segregates every website that you visit; this makes it hard for you to be tracked. On those websites, adverts from third-party apps with the possibility of spreading phishing links, or even apps that monitor your location are blocked.

Tor browser facilitates multilayered encryption thus making it hard for unauthorised persons to view details about you

The browser also resists fingerprinting. A fingerprint is an identity that can release your information with just a slight press. You must have noticed that whenever your fingerprint is captured to facilitate registration processes, using that fingerprint in the future will enable access to your information. Tor avoids that because it doesn’t want to put its users at risk of being identified

The browser enables you to browse freely because there is no record of past account details stored and neither is the account logged in

I just wanted to take you through the features of Tor browser before I take you through the steps and let’s go through the process of installing the browser, you may be interested in this link

Steps for installing Tor browser on your desktop

Step 1: Type on your chrome browser “tor browser” and search. Select the first result

On the upper right corner, click download. You will be taken to a page having links for downloading installation files for the browser depending on the operating system of your computer. Do not just download the software anyhow, because it may not be compatible with your operating system, select a software that is compatible with your operating system. When you look at the categories given there is download for Windows which is compatible for devices using Windows operating system, and then there is a download for macOS which is compatible for apple devices, there’s download for linux and then for android. Let’s assume we are installing for windows

Click download to be able to download Tor browser

Step 2: Select download and the software will be downloaded

Step 3: Open your downloads, copy and paste the file on your preffered location

Step 4: Double-click on the file or right click and select run

Step 5: Select the language and click okay and then click install

After downloading the Tor browser app, right click on it and click run, select language...

Step 6: Click finish and your browser will have been installed

How do we turn incognito mode as a supplement to the Tor browser especially in situations when you need faster results

Open your chrome browser, then click on the three dots of the to-right corner, click on new incognito window and then you can now browse privately

Tor browser is good but slow, but what is important is your safety than it being slow

You may want to read more about anonymity tools for people at risk

What is good about the Tor browser?

  • Hides your search history
  • Prevents third party apps from screen recording. Incase someone has installed a third party app to monitor your location, they will not be able to track your activity on Tor browser
  • Hides your location

Prevent adware attacks with these 5 useful tips

Adware has a high potential of harming your computer as well as destroying every information you hav…

How to recover a hacked Whatsapp Account; 2 ways

Hello, it has been a long time sharing with you something about digital security. During the time I …

10 reasons why your linkedin account was restricted

Are you wondering why your LinkedIn account was restricted? LinkedIn is a good platform for networki…

Can anyone hack google photos?: 5 answers

Google Photos is a feature of your Google account. The question ” Can anyone hack Google Photo…

6 secure browsing practices to adopt in 2025 for safer online experiences

Secure browsing practices are key to ensuring that internet users do not fall prey of cyber threats …

10 ways to know it is Vishing; a famous phishing scam nowadays

Vishing is the act of scammers using malicious calls to gather information or money from their victi…

6 Tips for preventing PayPal Scam

Preventing PayPal scam is crucial in this error where there is too much malicious activity being don…

1 2 3 7

About author