
In such files can be embedded macros that have requested access to the Internet directly from the program, bypassing the Tor network.

Do not download Tor Browser on third-party sites.īy the way Tor Browser is made based on the Mozilla Firefox browser, since it is the only browser able to work independently with Socks connection without an operating system.Īfter installing Tor Browser is fully operational.


For example, the site (added the letter S at the end) is trying to install on your computer a trojan. If you do not know what is this Tor Browser then read article what is a Tor network.ĭownload Tor Browser only from the official site .īe careful! There are sites that mimic the Tor Project website.
