Meet The New

Two years ago, we launched our styleguide as our first step in creating a consistent visual look and feel across the entire Tor Project ecosystem. Today, we are very happy to announce the launch of our brand new website.


Besides bringing more consistency to our visual look, which reinforces community identity and helps us to build user trust by identification, our new website is one part of our goal to ensure that everyone on the planet can use Tor. Last year, we worked hard on making important usability improvements to our browser, including bringing a version of it to Android.

But, it is through our homepage that most people first learn about Tor and decide to download our browser. And our previous site was doing a poor job at that. We had way too much information for a person to consume, and none of it was localized. With that in mind, we decided to redesign it to focus on new users and make it mobile-friendly. Most importantly with our new website, we want Tor Browser to be easy to download and its benefits easy to understand.

We want to make sure that people around the world, using Tor in an array of contexts, can use Tor without barriers. Tor Browser itself is available in 24 different languages, but our website isn’t. With this refresh, is now available in 7 different languages: English, German, French, Portuguese, Spanish, Italian, and Russian, and there are more on the way. If you would like to help us with translations, here’s how.

In addition to this update, we are also better organizing all the other content into different portals. For instance, last year we launched our support portal to host all the content related to user support. Coming next will be our portal that will feature content related to the different ways you can join our community and spread the word about Tor. The portal for all of our free software projects will soon be If you are looking for any content that existed in the old site and is not on the new one, you can access it here.

These efforts are taking the collaboration of many people across Tor teams and the help of dedicated volunteers. We’re very proud to start rolling these changes out.

We are a group of people united by the belief that everyone should have private access to the open web, and we hope our new site makes that easier to achieve.

To give feedback about the website or report an issue, you can create a ticket on trac or email the UX list.


March 27, 2019


Not a good decision.
One shouldnt assume baby level skill if someone wants to use tor.
The site is horrible in torbrowser default window size. Text is hueg.
Way less information.
Its ok to make tor accessible but please dont remove valuable information and shortcuts for advanced users.

> Also the signature files are gone. I haven't found anywhere how to download the signature for stable tor or tbb.

@ TP: uh oh! Signatures are critically important for Tor users. One of our most important tasks is in fact to teach newbies how to obtain the (public half of the) signing key and to verify detached signatures.

Newbies should be invited warmly at their skill level but then and taught and trained to raise their skill level. Advanced users should not be abandoned, crippled, or patronized down to newbie level in the context of this project. There is always an uphill learning curve. Accept it. But think about what shape it should be.


March 27, 2019


Über das Ziel hinausgeschossen.
Seite geht nicht richtig ohne Javascript. (Kommentare)
Seite hat in Torbrowsers standardmäßiger Fenstergröße viel zu großen Text.
Seite geht davon aus ich benutze Android während Desktop TB.
Abkürzungen für versierte User jetzt versteckt.
Babygespräch-Handgehalte. Braucht kein Mensch der ernsthafte Dinge tut.

2/10 Bitte die alte Seite wieder her.

> Seite geht nicht richtig ohne Javascript. (Kommentare)

That is a long-standing issue with this blog, which is actually a different site from, in part for security reasons I think.

Try setting the security slider to "safer" when you want to post a comment here.


March 27, 2019


Why does your website render incorrectly with Javascript disabled?
Why do some parts of the main page lack translation to Russian?

Introduce them to open-source software and cryptography concepts. Free/libre software licenses, copyleft, internationally open development communities, the history of GNU/Linux, how Diffie-Hellman key exchange works, public-key cryptography, elliptic-curve cryptography, Curve25519 and Dual_EC_DRBG, the Advanced Encryption Standard process (USA) that chose Rijndael, NESSIE (Europe), CRYPTREC (Japan), eSTREAM (Europe), the NIST hash function competition (USA), names of well-known cryptographers, names of well-known privacy advocates and software developers, names of whistleblowers who worked in the intelligence-industrial complex, the Electronic Frontier Foundation, the Freedom of the Press Foundation, hacker ethics, hackers' conferences (some are in the "Upcoming Events" side column on this page), hacker and maker history and culture, etc. Here are just two somewhat recent good introductory talks:

Jeremy Smith, author of A Hacker Called "Alien"

Cory Doctorow: The Fight for a Free, Fair and Open Internet

Open-source software code can be audited by anyone in the world. Free/libre open source software can accept and review code patches from anyone. The source code of Tor Project is a backbone for many other software and research projects and, as such, is heavily scrutinized by digital security professionals, researchers, and advocates around the world. The Tor network's relays are run by volunteers who choose to configure the software as a server: public and private individuals, organizations, businesses, researchers, and inevitably some state actors. Cryptography, statistics, design, peer review, and openness contribute to protecting its users.

Tor: Overview
Who uses Tor?
Tor Blog tag: tor stories
Get Involved: Volunteer
Tor Bug Tracker and Wiki
Tor Project's software development repository browser (examples: tor, tor-browser)

Thanks for your reply! Teaching basic crypto was the first thing I thought of but you gave me some more ideas (youtube links could be especially useful because I don't use that site myself).

I should have mentioned that the people I want to persuade to use Tor are not technically minded, but you reminded me that providing some background on open-source culture is essential. Hmmm... I don't want to overwhelm anyone but I agree it would be good idea to provide a sheet with some of the terms you mention, as background, to help them understand things they might hear if they start reading about digital rights.

This is could be a lot of work but I am all in so I'd be happy to hear more ideas, specifically about overcoming terror at the very suggestion of using crypto or Tor.


March 27, 2019


Is in RSS odd?

The pubDate of this article is: Tue, 26 Mar 2019 17:17:24 +0000. But the article was published on Wed, 27 Mar 2019 about 17:20:00 +0000 according to my web crawler for this blog. It isn't a big problem but just I'm anxious.


March 27, 2019


@ Isa:

I need to get advice from someone knowledgeable about using Tor to communicate with endangered people in a specific country with few Tor nodes and very low Tor bandwidth, but this should be a private conversation. I don't have email right now but can use Pidgin with Tails. Any suggestions?

More generally, it would be VERY useful to people like me if Tor could post in this blog some effective suggestions for helping people to get past their panic when they hear anyone suggest that Tor could help them keep in touch with people on the outside. Same for disk encryption. It would be good to protect both "data in motion" and "data at rest" but I guess that in some countries the second might irritate the security authorities much less and the first, and I'd be happy to get people to accept the potential risk of using ANY personal encryption.…

Define your threat model for yourselves and base your choices on it. Tails is great to begin with if everyone understands how to safely install and use it. Look into Tor bridges [1] [2], Tutanota, Protonmail, OnionShare, YubiKeys or similar hardware for 2-factor authentication, encrypted USB drives, KeePass, LUKS or VeraCrypt (difficult), safe configuration and torified use of PGP (difficult), Wire app or desktop but torified (experimental on tor), Cwtch or Tox but torified (experimental). Watch out for protocol leaks such as DNS or UDP leaks from programs that you try to torify. Tails takes care of leaky programs that you can't reconfigure to stop leaking.

Goodness, you saved me from a horrid error, I forgot I need to teach about bridges.

I should have said these are not technical people and anything experimental is probably too hard for me much less for them. Thanks for reminding me of those good links--- I find it very hard to keep handy a list of links and I guess I am not the only one because an up-to-date list of good resources is one important thing I never seem to find ANYWHERE. Fortunately I have a little time yet to do this teaching thing, so please keep the ideas coming!

> I find it very hard to keep handy a list of links and I guess I am not the only one because an up-to-date list of good resources is one important thing I never seem to find ANYWHERE.

Bookmark them in your browser, and give them memorable tags you can search by. Tor Browser is based on Firefox and can import/export bookmark files. However, bookmarks are saved unencrypted in the browser's profile folder on disk. Furthermore, Tails would forget them on shutdown, so you would have to export and save someplace else as you do for other personal files in Tails. Another cross-platform option is web-based bookmark managers if you trust them.

other help sites:

Examples for GnuPG configuration, but check the gpg manual before trusting them: -- see /configs/gnupg/ -- search for gpg.conf near the bottom


March 27, 2019


Thanks to all who worked on redesigning the home page of! My first impressions are good, but I did notice one thing which might not be intentional: the "About Us" section appears HUGE in my Tor Browser (running in current Tails).

I think the simplicity is terribly important and I love how you guys managed to eradicate all the technical stuff which is not going to help desperate or frightened newbies quickly learn what they need to know right now about using Tor for the first time in the next half hour. It's good to see Tor come so far from the early days when it was a toy for MIT students but hard to use for the people who actually need to use Tor, if I might so put it.


March 27, 2019


@ Isa:

I hope very much that you are reaching out to Glenn Greenwald in Rio, because he could help endangered people by helping us to grow the Tor community in Brazil (and around the world) by mentioning Tor more often in his writings at The Intercept. I think the major challenge might be that by his own admission he is uncomfortable with computer tech. But Tor is so easy to use now so I hope he will make an effort, if indeed he is not already using Tor for everything on-line.

He and most of the other journalists at The Intercept publish their PGP keys, and PGP is a hell of a lot more uncomfortable than Tor Browser or tor is to use. But you're right that he doesn't talk about it. I don't remember any of them talking about Tor, actually, except for Micah Lee who also develops software related to Tor, but I don't know about Greenwald's Portuguese articles. I really hope Greenwald knows how and isn't asking an IT person to decrypt his messages for him. Snowden went through all the trouble to train him personally before revealing his identity to him.... And Snowden was famously photographed with Tor and EFF stickers on his laptop. But yeah, Greenwald could easily spread the word about trustworthy encryption tools, and that would come back to help projects and development.

I fear he might take offense at my attempt to "volunteer" him as a Tor advocate, but I hope he will see I am sincere and understand how much political danger the Tor community and dissidents generally currently face in both the US and BR. His journalistic ethics are very strong and this is what I most admire about his character, so if he feels he cannot compromise in order to give back more to the privacy-technology community, I will be disappointed but I will understand.


March 27, 2019


With a "guard" in Russia how can this even claim to be what it is. I have now lost faith in the TOR project. The Guard should change upon request for a new circuit. Thus providing a true new circuit.

I guess your comment may reflect distrust of the Russian government, and if so I feel the same way. But if you are in Russia, using an entry guard inside Russia can help protect you. Some things about using Tor can seem counterintuitive until you learn more about the arcane technical points involved.

(Hmm... did I just violate a Russian law by hinting at dissatisfaction with certain policies pursued by a certain authoritarian head of state? Or a new law coming soon to another country with its very own authoritarian head of state? Am I extraditable now? Is there an all expenses paid one-way aerial journey in my future? Moscow, get ready, here I come!)

We The People of the world need to stand up to the bad guys because the most hateful and dangerous kind of authoritarianism is spreading.


March 27, 2019


It looks great. However, try zooming the page out to exactly 80%. It looks even better that way. Just a heads up.


March 27, 2019


I know a lot of sites with more better, less better design. But, sorry, this
design is -especially without JavaScript- most useless only?
I don't want bash the programmer of this experimental(?) design but the (not) 'old' design is much, much more better.
The new blank design looks like boring smartphone design.
Please bring back
to normal. It should be practical like like tor/torbrowser, not

I have not had problems that I have noticed using the new site with slider set at "safer".

I am not a TP employee but speaking as a long time Tor user: I know that change can initially be hard to accept, but please give the "new look" a chance! I did no work on it but I strongly all support the hard work it took to create the new look. This is why:

The very existence of Tor is under intense political/legal attacks all around the world. Further, the Tor network itself and Tor software is under intense technical attack by various more or less well-funded and capable bad actors. The single most important thing the Tor community can do to counter both kinds of attacks is simple: grow the community of regular Tor users worldwide! And this also happens to be the single most important thing we can do to help ourselves (We the People of the world) to help ourselves in the fact of growing ecological and geopolitical threats. Because, given that fact that our own governments are not helping or even worse are actively opposing our efforts to counter these threats, We the People must look out for own interests, because our governments are acting only in the interests of the elites, the very people most responsible for the ecological/geopolitical crises we are all facing.

My point is that the most important things Tor Project can do to help us grow the Tor community is to

(i) redesign the website to make it easier for newbies to quickly learn what they need to know right this minute (CHECK!!! thanks guys!!!),

(ii) translation (work in progress and much already completed--- thanks guys!!!),

(iii) reach out to truth-telling reporters, like minded NGOs, and even to progressive politicians, to build relationships which can help us counter the "Going Dark" messaging from FBI and similar population-control enabling propaganda from other governments,

(iv) reach out to endangered journalists, activists, medical providers, social workers, and maybe even diplomats and local government officials in various countries to offer Tor training (OnionShare in particular being incredibly useful to anyone who needs to share information safely, and this includes doctors who want to send your medical file to another doctor).

The long awaited website redesign addresses (i), previous posts have described (ii), and I hope we will see future posts about (iii)(iv).

IMO, it is good to see how far TP has come in the past few years.

BTW, I like the art and I hope others will come around. I came across some more great artwork in a digital rights org in another country which is promoting Tor use. Hurrah! Take that, FBI!! You have guns; we have words and art. And we will prevail. Using words and art.

"single most important thing the Tor community can [...] grow the community of regular Tor users worldwide!"

Thats right. But i don't see this in -nearly- any way with this new site.
Especially with no Javascript it looks more like a abandoned site in the net, not like a professional one like the FULL design( ).

" make it easier for newbies to quickly learn what they need to know right this minute"

What a newbie could learn on this new one? What? Help us understand.
You NEED the full site when you want to know more than the FAQ.
To make it little bit more smart set a big Non-JavaScript link to and
I don't understand why this must be explained?

(i) knowledgeable newbies trust concrete descriptions and open standards. they distrust placative marketing-speak, ie. "military-grade" on commercial websites, or mobile-store eye candy.

(iii, iv) EFF, FOFP, and other groups have been doing that for around 15 years while Tor Project was basically focused on releasing good software. It's good that TP is doing similar outreach events, but they are nowhere near being the first or only one.

I think TP doing its own outreach events is an essential part of growing user trust around the globe, and also will surely help bring in badly needed grassroots contributions from around the globe.

Liasing with like-minded organizations is also very important. In Latin America, one of the most important is Derechos Digitales (Digital Rights;, which is based in Santiago, Chile but also works in other Spanish/Portugese speaking countries.

Speaking of which, about the translation work: we should bear in mind that translation works both ways! One of the best written documents I have seen urging NGOs and individuals to use Tor and even to consider running an exit node was written by Derechos Digitales for Tor promotion in Mexico. This is a lovely poster with terrific artwork (eye candy can attract new friends!) and I urge anyone seeking inspiration to get a copy. It can be found at under Publications (look for "Use Tor!").

With the permission of the moderator, here is my somewhat free translation into English:

Often one associates anonymity with undesirable or even illegal behaviour. However, anonymity guarantees the right to express ourselves freely, to associate freely with others, and to engage in social protest and political dissidence; it allows us communicate and to access information in repressive contexts.

Who could benefit from using a tool like Tor?

o Internet users trying to avoid censorship in their country or region.
o Journalists communicating with at-risk sources.
o People who want to report an illicit act, but fear reprisal.
o People that suffer from a stigmatised illness and who require information and support.
o People opposed to tracking of their on-line activities.
o And many more.

Join Tor!

Install an exit node in your organisation. Internet anonymity allows us to protect privacy, promote freedom of expression and combat censorship.

Tor is both a software and an international community devoted to protect our identity on line.

Why it is important to create more Tor exit nodes in Latin America?

The Tor network is possible thanks to the guards, relay and exit nodes, that pipe information in order to guarantee the anonymity of data transport. The network is more robust to the extent that there are more available nodes and more people surfing through Tor.

In Latin America, where governments are constantly enacting laws fostering monitoring and massive cybersurveillance dragnets, we can defend our privacy rights by promoting anonymous communication between people, anonymized websurfing, and the installation of Tor nodes by individuals, organisations and institutions, because up to now our participation in the world-wide network does not reach 2%. We need to improve this figure.

What is Tor?

Tor is a network of computers (called nodes), distributed around the world and maintained by volunteers, that allows anonymous connection to internet and hides who accesses which information, by means of Tor circuits.

The simplest way to use the Tor network is to use Tor Browser, a browser web that incorporates Tor-enabled anonymity.

Tor is created and maintained by the Tor Project, a nonprofit organization based in the United States.

How does Tor work?

When you visit a website, networking software establishes a direct connection between your device and the server that hosts the content you want to access. Through the IP assigned to our device, is possible to determine from where this connection was made. But when you do this through the Tor network, the connection is enciphered and redirected randomly through three distinct nodes, making it very difficult to determine who is accessing which information and from where.

On behalf of the Tor user, a Tor exit node needs to connect with the requested website. If somebody abuses the Tor network to commit an undue act, the IP of the node could be logged (and provided to authorities). Although the exit node operator cannot reasonably be held responsible in such a situation, it is necessary to be ready for accusations which could arise.

More information

Visit, a website created by Digital Rights which offers valuable information on Tor, its operation and the positive role which the Latin American community can play in promoting digital freedoms.

Install a Tor exit node

The Tor network works thanks to thousands of volunteers who maintain the nodes of which it is comprised, thus helping to defend the right to on-line privacy, freedom of expression, and to combat censorship.

The greater the number of exit nodes, the stronger, faster, and more stable the Tor network becomes. However there are very few exit nodes in Latin America. Thus, the help of organisations and institutions that which defend human rights is fundamental. Can you help out?

What technical capacity is required?

To guarantee the stability of the node, you need:
• at least 10 Mbps bandwidth exclusively for use by the Tor server,
• a fixed public IP address for the node,
• a router that allow open connections, with the capability to designate specific ports for specific services,
• a computer powered up 24/7, with at least 520 MB of RAM and 200 MB of disk space, exclusively for use of the Tor server.
• don't forget to check that your internet provider does not forbid the operation of Tor exit nodes.

Legal considerations

It anonymity legal in Mexico?

• Yes. Both the national Constitution and international agreements to which Mexico is a signatory recognise the right to anonymity, to privacy of the communications, and to freedom of expression.

It is legal to install a node of exit in Mexico?

• Yes. While there is not specific law protecting Tor, the law allows the use of tools for privacy protection and freedom of expression, which are internationally recognised human rights.

Are there any obstacles to the use of anonymity tools?

• No. The use of Tor is not subjected to any type of limitation: encryption tools are recognised as a means to guarantee the security and confidentiality of information. Likewise, internet providers cannot block access to any network, included those that allow the anonymous activity of their users. However, it is necessary to consider that the Federal Law of Telecommunications and Broadcast requires internet providers to store, for a period of 2 years, all the data related to the connection of their customers. This means that all the active connections associated with the IP of the exit node will be logged.

What can happen if an illicit act is committed by someone using the IP of my node of exit?

• In Mexico there exists no law holding the operator of an exit node responsible for any crimes enabled through use of the Tor network. However, a judge can order that computer equipment be confiscated as part of an investigation. The node operator has to cooperate at all times with the authorities and cannot refuse to provide any needed help for an authorized investigation, as this could constitute a crime.

Although it requires of some knowledge and technical capacities, installing a Tor exit node is relatively simple.

Installation in three steps

Install Tor

At you will find indications to install Tor under Debian, but you also can install Tor in other Linux distributions and some versions of BSD.

Configure the node

Assign it a name, a port and a bandwidth.
Indicate that you want your node to function as an Exit and Relay.

Testing the node

Restart and test the node. After of a couple of hours, look for the IP of your node in the public list of nodes available at

Recommendations for the installation

Assign a subdomain to the node:

Afterwards, add a note in the WHOIS registration, explaining that this IP belongs to a Tor exit node.

Create an HTML warning page, stating that this server is a Tor exit node and explaining the type of traffic that is allowed to pass through the node.

Do you have a strong commitment to privacy rights and freedom of expression? Do you want to be part of the Tor project? Maintaining a node can be a great help!

If you need you need more information or support, visit or write us at

Came across a nice list of up to date links on important reports from Citizen Lab, EFF, etc., concerning specific malware suites being used to attack critical elements of civil society:…
Reports on Targeted Surveillance of Civil Society

> This is a somewhat comprehensive list of reports published by a number of organizations and individuals, that expose the use of targeted surveillance of members of civil society. This list is in chronological order, from older to most recent

(I know very little about SWOB but they are the same outfit which discovered the so-called Exodus Malware apparently sold by an Italian firm with links to Connexa, one of the firms mentioned years ago in this very blog as being involved in the ugly business of malware-as-a-service.)

Seriously, when clicking on windows button to download tor all I am offered is 64 bit regardless of security slider. However clicking "Download in another language" works. Hypothetically could people bork there current install of updating this way?