
Then simply open the folder and click to start Tor Browser.Execute the file you downloaded to extract the Tor Browser into a folder on your computer (or pendrive).Wait for the browser to connect to the node network. Configure is for people who are using a proxy to access the internet. The following guide provides steps to: Import the Intevation CA certificate. Click Connect in the Tor Browser configuration window.

Once Tor installs, press Finish, and the browser will launch.

It is very easy and similar to using a normal browser: Windows, OS X, Linux, and Android are supported. Thus, as a whistleblower, in order to protect your anonymity, you must first download and install the Tor Browser. Click on the tor browser launcher setting and the following pop-up displays on the desktop. Now you can run tor as src/app/tor (0.4.3.x and later), or you can run make install (as root if necessary) to install it into /usr/local/, and then you can start it just by running tor. If you have concerns about your traceability and you choose to submit your information in total anonymity, you will be using a submission system that is entirely based on the use of Tor technology, which is already integrated into our platform. WildLeaks has implemented a Tor-based secure platform in order to allow our sources to stay anonymous and to submit sensitive information in the most secure way possible, always encrypted, in respect to data transmission and management.
