27 March, 2014
TorBrowser for Windows - Digital Anonymity and Circumvention

The Tor Browser keeps your online activities private. It disguises your identity and protects your Web traffic from many forms of Internet surveillance. Tor can also be used to bypass Internet filters.

Required reading: 
What you will get from this guide: 

The ability to hide your location on the Internet from the websites you visit

The ability to conceal which websites you visit from Internet Service Providers (ISPs) and surveillance programmes

The ability to bypass Internet censorship and filtering rules

Protection from insecure and potentially malicious websites through the HTTPS Everywhere and NoScript browser add-ons


Q: Why should I use the Tor Browser?

A: The Tor Browser is a useful tool if you need to circumvent Internet censorship in order to access certain websites. It's also useful if you don't want your Internet Service Provider (ISP) to know what websites you're visiting, or if you don't want those websites to know your location on the Internet.

Q: When I run the Tor Browser, do all of my other programs communicate anonymously through the Tor network?

A: No, it is important to remember that, by default, the Tor Browser only sends its own traffic through Tor network. Your other programs communicate directly with service providers on the Internet. You can verify that you are communicating over the Tor network by loading the Tor Check page at https://check.torproject.org. Tor also assumes that you will exercise of caution, common sense and good judgement when browsing new or unfamiliar websites.

Q: Is my Tor Browser traffic encrypted?

A: Tor will encrypt all of your communication within the Tor network. Keep in mind, however, that Tor cannot encrypt your traffic after it leaves the Tor network. To protect the data you send and receive between your Tor exit node and the website with which you are communicating, you are still relying on HTTPS.