Tor - The Onion Router

How to get and configure the Tor Bridge

HIDING TOR FROM YOUR ISP – PART 1 – BRIDGES AND PLUGGABLE TRANSPORTS
One of the best things about doing it this way, is that you can configure it with the instructions provided to be a private obfuscated bridge, and therefore tor will not give it out to the public. If you suspect your access to the Tor network is being blocked, you may want to use bridges. If you do not use a proxy then select "No" and click "Next". However there's no need for you to use them, if your ISP doesn't block your connection to Tor. Tor should now be able to load successfully and the browser window should appear. What bridges are and when to use them How to use bridges in Tails If using Tor is dangerous in your country. The facilitator is responsible for keeping track of clients and proxies, and assigning one to another.

Search form


Actually I sent one to be sure about my answer: It is working perfectly. Also you can get new bridges through bridges. By clicking "Post Your Answer", you acknowledge that you have read our updated terms of service , privacy policy and cookie policy , and that your continued use of the website is subject to these policies. Questions Tags Users Badges Unanswered. Get Tor bridges via email. Is the service down? Is there something else I can do to get a list of bridges?

Farid Abdi 19 1 2. With regards to your concerns about the security of receiving bridges via email, please see this thread: In an attempt to reproduce your missing reply email, I sent a mail requesting bridges a couple of hours ago also from a Gmail account.

I'm also yet to receive a response. Perhaps others who know more about this service can help, or, alternatively, you could send a quick mail to help rt. To use bridges, choose to configure bridge settings from Tails Greeter:.

When Tails Greeter appears, click on the button. When the Additional Settings dialog appears, click on Network Configuration. Then, after starting the working session and connecting to the network, an assistant will guide you through the configuration of Tor. After Tor is started, the bridges that you configured appear as the first relay of your Tor circuits in Onion Circuits.

The Tor Project's documentation on bridges mainly focuses on censorship circumvention: If using Tor is dangerous or considered suspicious in your country, then there are some extra rules that you should follow in order to prevent yourself from being identified as a Tor user. Only use obfuscated bridges since they are harder to identify than other bridges. The less publicly known the bridges are, the better.

Unfortunately, since some bridge addresses can be obtained by anyone from the Tor website or by email, it is also possible for an adversary to get the same bridge information by the same means. The Tor Project has some protection against that, but they are far from being perfect. So the best is if you can find a trusted friend or an organisation in a different country who runs a "private" obfuscated bridge for you. In this case "private" means that the bridge is configured with the option PublishServerDescriptor 0.

Without this option The Tor Project will learn about the bridge and may distribute its address to others and so it could end up in the hands of your adversary.

Edit RecentChanges History Preferences.

Conclusion