Skip to content
Step by Step Internet 🌐 Guides for learning to surf the Net

How to navigate with Tor Browser through the Deep Web in a 100% secure way? Step by step guide

How to navigate with Tor Browser through the Deep Web in a 100% secure way? Step by step guide

If you are looking for navigate with Tor Browser on the Deep Web and need some information, stay because this is your site.

Tor refers to both an anonymous network that we can use to navigate content not indexed in traditional search engines as well as the specific browser that is designed to navigate in this network in the most harmonious way possible.

It is important to differentiate between both concepts to know what we do exactly when we enter the invisible internet and that is what we will do today, showing what both the network and the search engine are, how navigate and remind you , of course, the risks of diving too far into this deep sea which is the deep web .

What is Tor and what is the anonymous network for?

Qué es Tor

Tor (the onion router) is a distributed network that is superimposed on the internet , that is, through which content that we don’t find in other networks travel. It stands out and is used because, by its method of operation (onion routing).

This is based on a message encrypted and decrypted continuously, in layers, by several teams dispersed volunteers who do not know sender, receiver or content (except a small portion necessary to continue sending the package), it is possible to keep hidden the identity of the user and the information that is handled .

How to connect and safely use the anonymous Tor network?

navegar con tor

On the other hand, we have Tor Browser , which is a browser , created by TorProject, that will allow us , in effect, connect to the anonymous Tor network and access its contents in a secure way . The Tor browser is very similar to any other one you usually use, in fact, it is based on Mozilla, so if you use this, it will not be strange to navigate with TOR.

This is very flexible and resists attacks very well , these being its two basic characteristics, without detracting from the functions it includes. To achieve the purpose with which the network is created, and that is the right to anonymity and the secrecy of information.

This software works directly with the network, enabling the process of encryption of information (three-layer) to navigate in secure circuits that allow us to show random IPs to move in the network. You don’t have to worry about anything because by downloading, installing and running this browser you are already doing the anonymous TOR network.

Anyway, there are some points in this regard that you should consider and that are aimed at maintaining your safety, your anonymity and your integrity:

  • Update : Refresh the browser often, if possible, before each session. Once inside you just have to click on the onion-shaped icon, click on the option to check for updates and, if there is one, perform it; just as you would in Mozilla, Chrome, Safari …
  • Settings: We will see it below but do not downplay it. The configuration of the browser is very important both to keep you hidden and to be safe from anything harmful that may be on the network.
  • Single browser: There will be no browser in several tabs, and less to do the same (for example, to compare something). This can be counterproductive for many reasons but, in relation to security, we have excess demands from the same point, which can be striking, over-repetition …
  • New identity: When you want to leave a site and do a completely different search use a new identity (option available in the onion icon that allows you to perform a reset to start from scratch, without temporary files saved).
  • Onion services: They are especially secure sites whose address is encrypted end-to-end and have a domain in .onion. You can only access them from the TOR network and their location and IP have been conveniently hidden. On the internet there are many interesting site listings, of varied themes, which turn out to be onion services and, in addition, you can check the Hidden Wiki, which is a special encyclopedia for this type of onion services.

How to install and configure Tor Browser correctly?

Now that you know both concepts and that you know what you need, let’s see how to install the TOR browser on both the Windows and Android operating systems, as an alpha version for mobile phones has been released recently.

In Windows

The installation is done as follows:

  • Download TOR Browser . You will see that you can choose it in quantity of languages ​​and, incidentally, also for MacOS and Linux .
  • Click on the version that you are interested in having.
  • You will automatically download an executable. Open it by clicking on it when available.
  • The installation window will open, starting with the choice of language. Choose yours and click on the button « OK «.
  • After that you will find the route window or destination folder; choose it to your liking by clicking on « Browse «; the browser will be installed there.
  • Now you must click on « Install «.
  • The installation will be carried out conveniently and you will reach the final window, where you can deactivate , or not, the browser’s execution and icon creation boxes. Choose.
  • Finally, click on the « Finish « button.
  • Then, if you have kept the execution option, a loading window will appear and the browser will open. You can use it now! If this is not the case, go to the created folder and double click on the TOR executable.

To configure the browser you have several options:

  • Security :
    • Once you start the browser, at the top left you have an icon of an onion . Press it.
    • Go to “ Security Settings “.
    • In that window there are three options to choose from in relation to the security. You can read the characteristics and conditions of each side and click on « Learn more «. Choose the one of your interest at all times, always depending on what you are going to do.
    • Finish with the button « Accept «.

configuración seguridad tor

  • Red:
    • As for the network, you must press the onion again .
    • Then, in « Tor network configuration «.
    • Three options on censorship, proxy and firewall will appear. You will have to make the configuration of each one according to your case.
    • You will end with « Accept «.
  • Privacy and security:
    • Right at the other end of the top bar, on the right, you have a icon with three horizontal bars . Press it.
    • Click on the menu « Options «.
    • Now, on the left, click on « Privacy & Security «.
    • There is a very good configuration menu for aspects such as cookies, tracking, certificates, passwords … Select and deselect your Taste.

To start browsing , see this complete article about the TOR browser .

For Android

tor en android

We have already advanced that we have a version of TOR for Android, which allows us to use it also on tablets and mobile phones. To do this, in the same way, let’s see how to install and configure it.

To install TOR Browser on Android:

  • Enter the Play Store .
  • Search the search bar « Tor browser for Android «.
  • Choose the option with an icon of a globe, from the developer « The Tor Project «.
  • Click on the button « Install « .
  • Now it will be gone, replacing “ Uninstall ” and “ Open “; press the latter.
  • The application will open and you will have to press « Connect » to start using it.

Regarding your configuration:

  • Once you have connected (it takes a little), you will find a panel with several tabs; This is a tutorial that tells you how TOR works and what you get with it.
  • As you have finished, click on the button of the three horizontal lines >, top right.
  • We will start by changing the language in “Settings”, “General”, “Language” .
  • Let’s go back to stay in “ Settings ” and click on “ Privacy “. Here you can configure the privacy options (do not track, clean data when leaving, remember accounts, use of master password, cookies …).
  • Go back to « Settings » and click on « Clear private data «. Here you choose what disappears and what not in each new identity or circuit you do.

To navigate with mobile TOR:

  • Once in the browser (purple background), with your configuration done, click on the URLs bar .
  • Do the search that belongs to your interest. You will see that it has a default search engine but this can be changed, just as you normally do in your browser.
    • The results will appear in relation to the words you have entered ; This is exactly the same as if you do it in Chrome, Edge and others.
    • If you want to access the sites .onion (onion services) what you have to do is c to follow the directions of the sites that interest you and enter them, simply, in the URLs bar.

Dangers and risks when surfing the deep internet and how can we avoid them

Peligros y riesgos al navegar por la internet profunda

If we already have problems in the visible network, imagine a place where there is no law … The truth is that we can enjoy a perfect navigation, without incidents or any kind of problem; but it is also true that there are many dangers that are there and that you should know to avoid getting into trouble.

Security issues

The first and most obvious thing is that keep all the elements up to date updated, since small errors are common and updates are released very often. Do not hesitate to keep everything updated, but, honestly, we advise you to look for updates of the TOR browser every time you open it, so you make sure you enjoy the latest repair, improvement or novelty.

More and more constant research

The fact of having simple access to both the browser and the network and to the deep web and the increasing use made of all this makes more and more research on it, especially governments, seeking to track users who access restricted pages of political interest.

Your identity or that of your PC

Not everything is as simple as it seems. Your identity may be exposed for many reasons : have add-ons, plugins and data tracking and collection tools installed, use TOR and another network at the same time , that some password is discovered that can relate to you, that you give or let see (wanting or unintentionally) personal information, that your internet consumption actions end up relating (for example, entering your website from TOR or visiting the same page from this and another network), studying unencrypted data that you have sent …

Knowing your identity is obviously not going to be used for anything good. They can fake it, create accounts in your name, access your profiles, move your money or illegal money and even give you a good scare in person.

Malware

Undoubtedly, in the deep internet you will find malware everywhere. This is a sea of ​​malicious hackers and they will take advantage of , of course, the access of other users to infect them. The motives? From trying to know your identity (we return to the previous point) to get to use your computer, release certain information on a large scale or simply practice.

The solution for not infecting you is very simple: do not download or open documents that come from invisible websites . Of course, remove them as soon as possible if you downloaded them by mistake. There are many things you can see without downloading anything.

Scams

We have to say that it is not usual, but there are cases in which certain products are put on sale, bought and never known again. Of course, you don’t have any right to claim from anyone or want to do it because what you have “ bought ” on the deep web is probably not legal.

We repeat that this is not usual, in general, the businesses on these pages are, although it is hard to believe, very well valued, but the possibility of being scammed exists .

Mental health

The content you will find here will hurt the sensibility of many , because there really is everything. For this reason, don’t look for anything you don’t want to find; It’s that simple.

Needless to say, on the other hand, the psychological stress that would be caused by someone unwanted hitting you and harassing you, blackmailing or extorting .

Legal problems

Finally, you should know that, like you have come to know that here you can do all kinds of illegal things, the Police also and there are a lot of staff that is dedicated to looking for all types of criminals , either posing as a provider of something illegal, well, simply, observing. And if they observe something you shouldn’t do and call their attention, they will try to find you, do not hesitate.