Tor Browser Review: An essential and secure way to Surf the Web - (r)

Apr 12, 2023
Tor Browser

Share on

While this may not have been a primary concern in the early days of the internet, for those who use the internet today, the ability to reserve the right to protect personal information is crucial. Hacking is a big (albeit criminal) business too that continues to grow.

It is among of the best ways to keep prying eyes at bay.

What is the Tor Browser and Project?

Tor (shorthand of "The Onion Router" It's more than just a web browser. The entire project encompasses a variety of network tools, applications and related services. It's a non-profit entity that oversees the different elements in the system.

The purple Tor Browser roundel that shows a circle segmented into two halves: one full with color, the other using circular stripes.
It is the Tor Browser logo.

The project has connections to other organizations such as the Electronic Frontier Foundation (EFF) and has received assistance from the developers of Mozilla, producers of the open-source web browser Firefox. Actually, the money for Tor comes from various sources that you would not expect such as Google, the U.S. government and Google.

The Tor Project fulfills the role to ensure anonymity throughout the world wide web. The details of this will be discussed later on however for the moment it's important to know that the whole network helps in keeping anonymity pipelines available for many different users.

Although many of its features are no longer available, such as Tor Messenger, it's still a majorstay. In the next part we'll go into more detail about the reasons why it's a must to be aware of.

Why We're Reviewing the Tor Browser

The background of security and privacy is lengthy, convoluted, and complex. It's now a time of great concern for users about information privacy for the Tor Browser to need to be in existence.

Leaks from whistleblowers such as Edward Snowden and Wikileaks in the 2010s shows that the amount of surveillance on websites across nations is extremely high. Collaborations and initiatives like "Five Eyes,"" PRISM, and others worry many individuals to the point that they are worried for their safety. This makes internet anonymity an essential security concern.

Simply put, Tor enables access to the "dark web." Although the dark web receives some bad publicity (namely for illegal activity) however, it has plenty of good too, as we'll explore. It exists on "darknets," which are overlays that you need specific tools or authorization for access. The Tor Browser enables this access to the dark web, however, it also has access to the regular so-called visible web as well.

Actually, there are several other web browsers capable of accessing this dark internet. But, Tor handily beats the rivals due to its plethora of features -- so much so that certain alternative browsers make use of Tor as its base.

Let's talk more about what Tor can do.

The Tor Browser's Most Important Features

The Tor Browser is a "modded" version of Firefox. In addition, the developers team includes a couple of more details to enable you to navigate the dark internet:

In common with these kind of programs, Tor is open-source and it doesn't have a cost-effective version to download. That means that it's free to anyone to download and install. It even has an GitHub repository to those who are unable to connect to the primary Tor site.

You can even extend the platform similarly to Firefox however it's not recommended. You'll find that the use of a browser like Tor isn't a typical internet experience.

Development Tools from Tor. Development Tools

A Tor Browser window showing the DuckDuckGo website, and the link to the Web Developer Tools in the main toolbar.
It is the Web Developer Tools Link is within Tor.

However, we wouldn't recommend that you make use of them. To begin, its best use case is not development work, and you'd do better an alternative solution that works with an alternative like Firefox Developer Edition.

The Tor Browser's Focus on Anonymous Browsing

From a technical perspective, Tor works just as Firefox performs on its front-end. This means you get an experience similar to a top web browser, which will get regular updates and help.

Under the hood is more happening.

The initial development of the Tor Browser comes from the US Navy of all places. The idea of securing internal, cross-government communications marries up well with the general necessity to safeguard privacy from throughout the day. Anything you transmit to or from the Tor Browser can be encrypted by default.

From there, data transfers between multiple relays of the Onion Router network. Data is transferred across three relays each being part of a volunteer-led network of machines. It "homogenizes" the base of users, meaning that you would be able to see only that the user runs Tor but nothing else.

Security The Levels

The Tor Browser lets you customize its security provision using various levels. There are three levels you can select from and each one chops off an aspect of the features:

  1. Standard: The default mode, where all the features and functionality are in use.
  2. Safe: Here, you'll only be able to view static pages, but with additional limitations on the functionality that you can use. JavaScript is disabled for all sites.

You can change these anytime based on your requirements, however in most cases, the Standard Tier will suffice.

The Onion Network

It is the Onion Network is a descriptive term used to describe the manner in which the data packets are moved across encrypted data. They move through a variety of layers, much like an onion. The data travels across four different network nodes.

Every node removes an encryption layer and then reveals the next location for the information. After the chain, the data will present itself at its destination. Additionally, each node is only aware of its location relative to the prior and next node. This increases anonymity, and you'll have a high level of security, no matter which location you're located.

The ability to block ads and extend the browser

With regards to browser extensions, since Tor is built on Firefox, you can install any and all of them in the Extensions Library. The problem is that none are supported by Tor Project. Tor Project.

The Mozilla extension library screen showing a collection of different extensions you can install for the Tor Browser. Each one has an icon and a user count, and they are separated into various related categories.
The Mozilla extension library.

Tor includes all of the extensions it can support It also includes a caution in the user's manual warns that you may compromise functionality or, worse, compromise your privacy and security.

In terms of blocking ads the built-in way that Tor can achieve this. Some aspects included in the NoScript extension will put a halt to specific ads, but it won't stop them all.

Use the levels of security within Tor's settings will be the best option to block ads from appearing in the first place, and which allows you to modify the other features of a site's functionality.

For all intents and purposes it is true that the the Tor Browser software is legally available for download and installation, and utilize for all users. We talk about many use situations in this blog post on legal options to utilize the features Tor provides.

But, it's also the case that many criminal activities take use of Tor and specifically the dark web. In the US in the United States, however, Tor is legal to make use of. Certain countries which typically restrict information, such as China or Russia, Tor can't be employed legally.

That said, even in America, even in the US, law enforcement tries to shut down some users. So there's a certain pushback on the level of government to Tor usage, particularly as Tor provides greater privacy.

The drawbacks to using Tor

As with most things, Tor has both positives as well as negatives. We'd say this is the best method to browse the web without being hacked, but it's not a foolproof solution. Actually, it can't prevent from end-to end "correlation." This is the place where you pinpoint the source of a malicious hacking attempt through multiple sources of data.

In addition, in some unusual scenarios, you might still be exposed to vulnerabilities:

  • Some websites can sense that you use Tor and stop access due to this.
  • It's not impossible for a bad actor to get a trace of your mouse movements, later using it to identify you.

Therefore, Tor isn't a failsafe alternative for anonyme browsing. However, Tor is still widely considered the safest and most secure way to browse the dark internet.

Utilizing the Tor Browser to connect to a Virtual Private Network (VPN) With the Tor Browser

There are two ways that you can combine the two tools:

  1. You may start your VPN first, then open Tor within it; or
  2. Tor can be opened by opening Tor at first and then connect your VPN.

It's like they're the same process, but there are some major variations that reveal positives and negatives for each.

In the majority of cases it is recommended to connect your VPN prior to using Tor because this way you can access dedicated "Onion" websites.

But, be aware that any choice will reveal your browsing data to an outsider. This could be the VPN provider, your ISP, or both. This is another aspect you'll have consider in order to determine the most appropriate choice to protect your privacy.

Tor's Speed and Performance

In short, the speed of the Tor Browser in terms of speed is poor (in terms of being far too slow for the typical internet user). This is an important fact to consider the issue when you are considering using Tor because the speed deficit can negatively affect the user experience.

Since it is relays for connecting to the web and how the connections are nearly random each time it is difficult to pinpoint specifics relating to benchmarks. For example, Cloudwards, a security blog Cloudwards' own benchmarks show the Tor browser isn't competitive compared to other browsers. In fact, it doesn't perform even a single point on a few tests.

But, if you take a look at websites such as HTML5test, you can see how Firefox -- the parent browser here does a great job.

The HTML5test website, showing a results panel that reads, "your browser scores 515 out of 555 points." There is also an indication of the browser and operating system the sites used to conduct the test.
The HTML5test website.

Remember, though, Tor Browser offers higher level of security, and employs different methods to access the internet. Furthermore, running test benchmarks isn't going offer you an actual view of your own experience of how Tor is performing.

What is the Tor Comparative Advantage? Tor Compares To Other Browsers

In the following sections, we're going to look at how Tor is compared to other well-known browsers. But, it shouldn't be your primary way to decide whether the Tor Browser is for you. Most commercial web browsers don't provide privacy or security as a primary, highlight characteristic (although they will give it due attention).

We'll start with one that is in many ways completely different from the Tor Browser: Google Chrome.

Tor Browser vs Google Chrome

There's a good chance you've heard about Google Chrome. The browser has a percentage of market that is unparalleled by its competitors, as is to be expected given that it's backed by the company that makes search engines, Google.

The Google Chrome roundel, showing a segmented outer circle in red, green, and yellow. There's also an inner circle of blue surrounded by a white border.
The Google Chrome logo.

This browser is available on almost all devices, and it will even come with certain smartphones like the Google Pixel.

In fact, you could say that it sets the bar for web browsers, especially with regards to the technologies that it provides:

  • The service offers an integrated search bar as well as address bar, which can pick out files and documents that are not available through other Google services.
  • Additionally, you get access to an huge extension library for you to personalize your experience to meet your requirements.

It's not exactly logical it is to draw a distinction between Google Chrome to Tor here however it's worth pointing out: Chrome -- and Google itself -- are at the forefront of sharing data. Even a cursory search will expose the Google's policies relating to data harvesting. It has been several legal proceedings that have been filed in the past, aimed towards the shady and untruthful way Google handles the data it collects.

Contrary to that, Tor is so locked down that it is unable to be competitive with other web browser when it comes to speed. This is why it will be of immense benefit in the event that you wish to safeguard your identity and information.

It's not possible to say Tor is better than Chrome in all aspects as both have different objectives. You shouldn't need to switch to Google Chrome at all if you want to remain anonymous.

Tor Browser vs Brave

The Brave logo, consisting of a lion's head graphic in orange and white.
The Brave Browser logo.

The creators of Firefox include the inventor of JavaScript as well as the co-founder of Mozilla (i.e. the Firefox developers.) However, Brave will be built upon Google Chrome rather than Firefox. This is what Brave will provide along with Google Chrome's experience:

  • Brave runs on the latest beta version of Google Chrome -- Chromium. In this way, you are able to add the same extensions as you'll find in Chrome's Chrome Web Store.

This last point is an area where we could look at comparing Brave against Tor. Actually, the private browsing windows use the function of Tor to hide your fingerprint. This is a great option, however Brave has some limitations.

As an example, you can make money by watching ads, which is in stark contrast to the main reason to use Brave. This also means you'll need to be tracked in order to tally up the number of ads you've seen.

For a general browsing experience We'd suggest Brave is one of the top options due to its speed advantages over Tor. Privacy-conscious browsing options are very much appreciated. For the security and protection of your privacy, Brave might not do enough, and its general features set is in contradiction to its primary goals on a regular schedule.

Tor Browser vs Chromium

If you're using Brave, Google Chrome, Microsoft Edge, along with a variety of other similar browsers, that they use Chromium as a base. This is the development and open-source versions of these browsers. However, this isn't always the case. cutting-edge features.

The Chromium browser roundel that shows an outer potion segmented in different shades of blue, and an inner segment of blue surrounded by a white border.
The Chromium web browser's logo.

If you compare Chromium to other browsers that use it as a base You'll see a sluggish features list. It's because Chromium isn't a browser for the general public, although some do use it. But, we'd advise you to use a different internet browser because of the following:

  • Chromium is basically a "beta" version of the browser. There's no installer manager, so you'll need in order to "compile" the program prior to using it.
  • The current version of this browserevery version, in fact -- is only available as nightly builds. It version is known as the "end-of-the-day" version of the browser that the creators are expected to upload, meaning that it may have issues, bugs, or vulnerabilities.

Chromium's primary focus is learning how to build a web browser, not in security or privacy. It's our opinion that Chromium provides the least security for the various reasons we've mentioned.

Due to this, Tor is the best option for security and your privacy.

Tor Browser vs Mozilla Firefox

Among users and developers alike, Firefox is a standout. It is an advocate for open source fundamentals including security, privacy and much more.

The Firebox browser window showing a start page containing social media links and further links to blog posts. The background shows yellow, blue, and pink shapes.
Firefox is the Firefox browser.

Here's what Firefox offers you in regards to your security-conscious browsing experience:

  • There's a full-featured private browsing mode, on par with most other browsers.
  • Firefox will block a number of web elements by default. This includes cryptomining scripts such as social trackers, as well as trackers from third party companies.
  • Firefox includes a built-in password manager to help to keep all the credentials that you make use of.
  • Firefox can block any media that attempts to autoplay and give you the option to either play or not.
  • The browser also offers an extensions library, so you can integrate HTTPS connections automatically and integrate an ad blocking feature as well as many other features.

If you're comparing Firefox to Tor and Tor, it is important take into consideration where it is when you compare it with other browsers. To ensure the highest level of privacy and security We'd recommend Firefox over every Chromium-based browser particularly Chrome.

However, Tor does offer much more security and protection by offering a comparison of the two. It is logical based on what each browser provides.

If you have concerns about day-to-day privacy , yet still want a snappy browsing experience, Firefox will fit the right way.

Tor Browser vs Apple Safari

If you're an Apple people, Safari is the default browser and works well on all its devices. It's a popular "set and forget" sort of browser.

However, it might not be the most ideal option if you want to protect your privacy and your security.

Three devices — MacBook, iPhone, and iPad — showing various instances of the Safari browser, including a start page for the MacBook, a green blog for the iPhone, and a browser privacy report for the iPad.
It's the Apple Safari browser.

Overall, Safari is a functional browser that works seamlessly with other Apple products. This is an advantage to the majority of users, and it means the primary goal of the browser is met.

However, Safari doesn't offer some aspects we'd want from a private and secure browser.

  • There's no autoplay blocking functionality, which means you'll need to find an extension (if one exists).
  • Safari doesn't block cryptomining scripts. It's unlikely to impact you much However, it's nice to know that your browser is able to protect you from all sorts of malicious actions.
  • Apple Safari is a private piece of software. It means that the source code cannot be viewed at. While this isn't necessarily a problem, open-source software has lots more eyes on the code base, which means that developers are able to contribute in order to correct problems and mistakes faster.

It is also open source. Tor Browser is also an open source and includes all the features that Apple Safari lacks. Performance is also an issue, but the overall goals for both browsers differ.

It's not like we're saying Tor is an "everyday" browser, but it is certainly more than Safari in the event that you must browser as an anonymous user.

How to Install and Use the Tor Browser Tor Browser

As with any app it's necessary to download and install Tor Browser on your computer. You can find an official webpage for doing the task at the Tor Project website.

The Tor Browser download page in purple, showing a heading that reads, "Download Tor Browser," and different links for Windows, macOS, Linux, and Android versions of the browser. There is also a set of navigation links, and the Tor logo, along with a yellow "Donate Now" button.
The download page for the Tor Browser.

The first step is just the same as other type of installation. Download the file, extract it, and then follow the instructions for installation for your Operating System (OS).

When you've completed the procedure, you are able to open your Tor Browser as you would any other program. Doing so will bring up a blank window, complete with buttons that allow you to set up your client and connect to your network.

The main connection page for the Tor Browser on a red, blue, and purple gradient background. The text reads, "Connect to Tor. Tor Browser routes your traffic over the Tor Network, run by thousands of volunteers around the world." There is also a purple Connect button, another to configure your connection, and a checkbox to "Always connect automatically."
Blank Tor Browser window showing connection buttons.

When you hit Connect Connect button, you'll see the web browser attempt in order to establish a connection with Tor Network: Tor Network:

A partial Tor Browser window on a red, blue, and purple gradient background that shows a purple to blue progress bar and a notice that reads,
Making a connection with the Tor Browser.

It could take some time dependent on a variety of factors. Overall, the Tor experience is slower than the average experience for the reasons we outlined earlier.

Once you do connect when you connect, you'll see an initial screen.

A Tor Browser window on a red, blue, and purple background. The screen shows the start page for the Tor Browser in purple that shows a DuckDuckGo search bar and a heading that reads, "Explore. Privately." There is also some explanatory text, and links to the Tor Browser manual, newsletter, and onboarding wizard.
The Tor Browser Start screen.

From this point, you are able to start to explore the internet, either using a dedicated URL that uses it's .onion TLD, or with the DuckDuckGo searching bar.

If there isn't a mirror link on the website you wish to view, Tor is much like any other browser, albeit a painfully slow one that has a few "quality in life" options (which will be discussed later):

A Tor Browser window on a red, blue, and purple background that shows the .onion version of the BBC website. There are headlines for various news stories, but no images.
It's the Tor Browser showing the .onion version of the BBC website.

You can, however, make use of an onboarding wizard in case this is your first time using Tor.

The hyperlink to this wizard on the upper-left right-hand corner of the screen. It will open an overview of the steps you need to take to learn to navigate your new browser.

The Tor Browser onboarding wizard, in white, that shows a set a navigation options on the left, text in the middle about the tab in question, and a graphic of a smartphone surrounded by a mganifying glass, crosses, and circles. The phone also has a shield complete with a tick. There's also a purple,
The onboarding wizard in the Tor Browser.

Each of the panels will provide more about Tor, but in some cases will also give you access to other configuration screens for making changes:

A Tor Browser window that shows part of the purple start screen, and a larger portion of the white onboarding wizard. Some of the left-hand navigation items show teal checkmarks, the central column shows text with the heading, "Travel a decentralized network" and a gray button to "Adjust Your Tor Network Settings." The right-hand side shows a circular graphic of a menu icon, and a purple button that reads, "Go to Circuit Display."
Through the wizard for onboarding in the Tor Browser.

There is a variety of methods to gain access to these settings. We'll go into next.

Adjusting the Tor Browser's Settings

If you are looking to set up your Tor browser, you can configure it in various options. It is the usual preferences for Tor browser option on the toolbar is a good way to do this:

A small portion of the Tor Browser window (complete with the address bar and General tab of the Preferences screen) that shows the app's drop-down menu, with the
The Preferences link within the Tor Browser.

However, you can also find the settings using Onboarding Wizard. Onboarding Wizard too:

A partial Tor Browser window that shows the onboarding wizard. There are left-hand navigation links, and a central column with a heading that reads, "Travel a decentralized network." At the bottom is a gray button to, "Adjust Your tor Network Settings."
Clicking this button will take your to Tor Browser Preferences screen within the onboarding wizard.

However what, regardless, the Connection tab within the Preferences screen will let you change things up if you're required to:

A Tor Browser window on a red, blue, and purple background that shows the Preferences screen. There's a left-hand navigation menu with the Connection section highlighted. The main part of the window shows the Connection options, complete with buttons to test the connection, and checkboxes to quickstart the process.
The Connection screen appears within settings for the Tor Browser settings.

You can also connect to "bridges." They can be used of connecting with Tor where it might otherwise be restricted. If you know bridges, you are able to enter it in the Bridges section. Or, you can request one through the Tor Project itself:

A small portion of the Tor Browser Connection screen that shows options to connect to bridges. The heading reads, "Bridges" and there is a sub-section to, "Add a New Bridge." There are three options here to, "Select a Built-In Bridge…," "Request a Bridge…," and "Add a bridge Manually…"
The Bridges section of the Tor Browser connection options.

In addition it's important to look over your security settings from the icon in the toolbar in your browser.

ALT TEXT: The upper portion of the Tor Browser showing the Security Level drop-down menu. The setting is at
This is the Security Level drop-down menu in the Tor Browser.

The button here to change button here will take your to the Security and Privacy section on the Preferences page. It allows you to alter your security settings according to the purpose you want to:

A Tor Browser window on a red, blue, and purple background that shoes the Privacy and Security settings. There are three radio buttons for Standard, Safer, and a Safest options, complete with explanatory text.
Your Privacy and Security Settings inside the Tor Browser.

Once you look over the settings, and then set it in accordance with your preferences You'll be able to explore the Onion Network.

Summary

There are various levels of privacy and security you can take with regards to web security. Although the majority of commercially-owned browsers, such as Chrome, Firefox, and Safari provide a variety of choices in terms of security and privacy, none can offer all the features that you require to navigate the internet's dark side.

In this Tor Browser review You've learned nearly everything you need relating to how you can access that dark internet and whether it's a suitable one for your purposes.

Our opinion is that Tor is the ideal way to get onto this dark internet. Others browsers do not offer the capabilities or the backing to be up-to-date.

Have you got anything to include on this Tor Browser review? Let us know your thoughts in the comment section below!

  • Easy setup and management in the My dashboard
  • Support is available 24/7.
  • The most efficient Google Cloud Platform hardware and network powered by Kubernetes to ensure maximum capacity
  • Enterprise-level Cloudflare integration for speed as well as security
  • Global audience reach with up to 35 data centers as well as around 275 POPs in the world.