Tor for Win32

Installing Tor

The latest stable release of Tor for Windows 32 is 0.0.9.1. Download it by clicking the link. You can find experimental versions here.

Our Tor installer should make everything pretty simple. Below is a screenshot of the setup page:

tor installer splash page

By default, Tor is not configured to run at startup. You can enable this by checking the "Run at startup" box as shown below. Be sure to leave the other boxes checked.

select components to install

Once the installer is finished, it will run Tor in a DOS window so you can see its logs and errors. (You can minimize this window, but do not close it.)

tor window screenshot

Tor comes configured as a client by default. It uses a built-in default configuration file, and most people won't need to change any of the settings. Tor is now installed.

After installing Tor, you should install Privoxy (click on 'recent releases', then scroll down to the Win32 installer packages). Privoxy is a filtering web proxy that integrates well with Tor. Once it's installed, it should appear in your system tray, as pictured below:

privoxy icon in the system tray

You need to configure Privoxy to use Tor. Open Privoxy's main config file by selecting it from "Start Menu"|"All Programs":

editing privoxy config

Add the line
forward-socks4a / localhost:9050 .
to Privoxy's config file. Don't forget to add the dot at the end. The easiest way is to select the above line and copy/paste it into the file. Be sure to save.

privoxy points to tor

Then change your browser to http proxy at localhost port 8118. In Mozilla, this is in Edit|Preferences|Advanced|Proxies. In IE, it's Tools|Internet Options|Connections|LAN Settings|Advanced. You should also set your SSL proxy (IE calls it "Secure") to the same thing, to hide your SSL traffic. In IE, this looks something like:

LAN settings in IE Proxy settings in IE

Using privoxy is necessary because browsers leak your DNS requests when they use a socks proxy directly, which is bad for your anonymity. Privoxy also removes certain dangerous headers from your web requests, and blocks obnoxious ad sites like Doubleclick.

To test if it's working, go to this site and see what IP it says you're coming from. (If it's down, you can try the junkbusters site instead.)

If you have a personal firewall, be sure to allow local connections to port 8118 and port 9050. If your firewall blocks outgoing connections, punch a hole so it can connect to TCP ports 80, 443, and 9001-9033. For more troubleshooting suggestions, see the FAQ.

To Torify an application that supports http, just point it at Privoxy. To use socks directly, point it at localhost port 9050. For applications that support neither socks nor http, take a look at SocksCap, FreeCap, or the Hummingbird SOCKS client. Let us know if you get them working so we can add better instructions here.

If you have suggestions for improving this document, please send them to us. Thanks!