When downloading the browser, I have such a daddy on my desktop

You need to go into it and select the folder Browser => TorBrowser => Data => Tor.





In this Tor daddy, we are only interested in the torrc file, you need to open it with a blank note and enter the command in it so that the output always contains one or several countries that you need.


Since I do not need the whole world to work, but only our one homeland, I changed the settings of my browser by entering the command in this way. I only added the last line. ExitNodes (ru), it looks like this for me.


But this is in the event that you need one country, and if you need several, then you need to write them separated by commas and always in such curly brackets. Then start saving. In my case, ru is the designation for Russia. The designations and letter codes of the countries of the world can be found on the Internet, I look at them on the site [link] in a column of 2 letters. Well, in order to select a specific city, you just need to click on the onion and then the cities will change only from the list of those countries that you need. In order to check the city that you are currently configured, you need to enter the command into the search bar of the browser [link] and configure the browser to the desired city manually.


After entering the command and saving, the browser works as it should.

And now not a lot about the cons that I see in it for myself:

  • not all forums and sites allow entry from such a browser (for example, Flamp cannot be fooled in this way)
  • Works slowly, but this is due to the constant change of nodes in the chain
  • Sometimes the IP address changes too quickly and at the wrong time.
  • After updating the browser, you need to re-enter the logins and passwords of the pages on which you were at the moment, enter the mailbox for example

Still, I like this browser and use it. It opens up a lot of possibilities. And if I find out something new about him, I will definitely inform you.

Many internet services provide access to their services only when you visit websites or applications from certain countries. IP addresses, and sometimes more variables such as system time, are checked when the user wants to access country restricted services. If the IP is in the country, access is allowed, otherwise it is denied.

There are many workarounds to help users to access these services even if they currently reside in another country. One of the possibilities that I want to talk about in this article is how to configure Tor in such a way that the node exit is in the country to which you want to access the services. Tor offers many so-called nodes that are servers in a particular country with them and works software Tor.
For this I use the Vidalia package which contains all the necessary software to explain how a particular country can be selected when using Tor. You can download Vidalia and install the software from the link at the bottom of the page. The main interface of the program will boot after installing Vidalia.

The dashboard displays the current state of Tor... The additional information displays exactly what we are going to use to find servers located in the country we want, the IP address of which we need. Click on the View network link - it displays a visual representation of all Tor servers, but only if Tor is running.
Servers can be sorted by country (next to flag), there is also a performance indicator next to them. Make a note of some of the best performing server names and exit the menu. We need to add these servers as node exit in the Tor config. Click the "Options" button and there, on the front, a menu tab is displayed, in which you will find the Tor configuration menu entry.
Click the "Browse" button to open a file browser dialog... Left-click on the "torrc" file and select "Edit" from the menu. Now add the following two lines in the config, just insert them at the beginning, for example:

Server1 ExitNodes, server2, server 3
StrictExitNodes 1
Replace server1, server 2, and so on with the names of the servers that you recorded in the network display window. Stop and restart Tor for the changes to take effect.
Now we have to add an HTTP proxy for our browser Firefox. Click on Tools> Options> Advanced Networks and there click on the "Settings" button. Select Manual Proxy Configuration and enter the local port 8118.

You can check the performance using the scriptvisiting IP lookup, which should display the IP of the country you selected from the servers. Download and install the software Vidalia is available online.

We make it so that the IP addresses in Tor are only for certain countries. For everyone who uses the Tor browser, it is no longer a secret that the ip addresses there are constantly changing. And let's say, if you are defined as a user from the United States, then in a couple of minutes everything can change. And you will use some other address. For example: Germany, Greece, France, etc. It is impossible to change a permanent shift, but you can make it so that each next address that will be assigned to you is one specific country.

In order to do all this, you need to edit the file torrc located in the directory Tor Browser-> Data-> Tor-> torrc... Open this file with notepad and add the line to it ExitNodes ()... In brackets { } you must specify the letter code of a specific country, the ip addresses of which you will use. For example, for Russia there will be ExitNodes (RU), for the USA - ExitNodes (RU), Germany - ExitNodes (DE).

A complete list of countries and their letter codes can be found on Google. Save your changes in notepad and start Tor.

How to set up Tor correctly

Who Uses Tor?

Family & Friends

People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.

Businesses

Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.

Activists

Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.

Media

Journalists and the media use Tor to protect their research and sources online.

Military & Law Enforcement

Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.

Here you can find answers to questions about the network: advantages, disadvantages and Tor problems networks. All this will help you to easily achieve anonymity on the network and avoid cases of revealing your identity.

Tor - what is it?

Tor is the global Internet network that ensures user anonymity. It is known to many as onion routing. You can connect to it using the Tor browser.

Why do you need Tor?

Tor's main advantage is its anonymity. What kind of requests you make, what IP address you use, what files you download - no one will know. In addition, you will be able to view sites that your provider usually blocks.

Browser Tor, how to select the IP of a specific country, how to ban the IP of a specific country

Moreover, you will be able to view onion sites and view a site from a different geographic region. Just remember: using any browser other than Tor on the Tor network will not ensure your anonymity.

How to use Thor?

The Tor network alone is not capable of protecting all of your internet traffic. It is capable of protecting only those applications that are configured to transmit data through it. For your convenience, you can use the Tor browser. It is already optimally configured to protect your anonymity on the Internet. Using any other browser with the Tor network is unsafe.

Is torrenting over the Tor network real?

Unfortunately, you cannot download torrents when you are on the Tor network. Otherwise, your real IP address will be visible to others. This means that anonymity is leveled. Plus, Tor's performance will be slow - not only for you, but for other users as well.

Can I install additional plugins for the Tor browser?

Thor browser by default blocks any plugins such as Flash, RealPlayer, Quicktime and others. The point is, they can reveal your real IP address. And that is why we do not recommend installing additional plugins for the Tor browser. Otherwise, the benefit from using the Tor browser will be minimal or completely nullified.

How do I stay safe while using the Tor network?

Use only secure https connection to connect to sites. There is an extension in the Tor browser that always establishes just such a connection. Still, it's better to make sure for yourself that the address is specified as https: // in the address bar, and you see the name of the site that you requested.

How to avoid detection in the Tor network?

While you are online, do not open documents uploaded through Tor. If the browser has warned you about a danger when opening a document (DOC and PDF), do not ignore it. After all, the document may contain links to certain Internet resources, by opening it, you will disclose your IP address to others. So it is better to disconnect from the network or the Internet before opening such documents.

How to hide the use of the Tor network?

Thor hides the sites you connect to from attackers. But, by default, it does not hide the use of the Tor network. Therefore, if it is important for you to hide the usage itself, then you can reduce the risk of detection using the Tor forwarding bridge. But the best way to protect yourself is social: the more Tor users are near you and the more diverse their interests, the more difficult it is to find you among them. Invite other people to use Thor too!

Should Tor be used for illegal purposes or should such use be encouraged?

No, Thor is designed for freedom of expression, privacy and human rights protection. Tor is not a law-breaking application, either by Tor users or by the owner of the forwarder.

Can you promise that I won't get in trouble getting the Tor forwarding server up and running?

No, any new technology creates some legal uncertainty and Tor is no exception. And we cannot guarantee that you will never be held liable in any way for your Tor forwarding server. However, we truly believe that the people providing forwarders should not and cannot be held responsible for the traffic that passes through them. As a confirmation, we ourselves provide a server for forwarding traffic for the needs of the network.

Tailored specifically for you

The Tor network consists of a huge number of intermediate (middle relay) and end servers (exit relays), through which user data passes through thousands of threads. To get an idea of ​​the scale of the Tor network, take a look at the world map of servers in the Tor. It is through one of them that your data will run the next time you launch the tor browser. The dynamic map can be viewed at the link.

As in any computer network Among the servers, there are faulty, infected, and sometimes cybercriminals' servers. Most often, such servers hunt for passwords from social. networks, Email or credit card details.

To promptly exclude such nodes from the network, the Tor Project team develops and maintains two free programs. They allow you to identify and block "bad" sites and make Internet surfing as safe as possible.

Exitmap checks exit servers - the place where traffic leaves the encrypted tor network and goes to the clean internet. For this, an algorithm for comparing operations on all target servers is used.

For example, a user can log into Facebook (by entering a username and password) directly, without using Tor. Then write a digital signature that the site uses to confirm that this is indeed the real Facebook. You can then compare the signature with the signatures obtained through Exitmap. The program uses thousands of output relays to connect to Zuckerberg's site, recording each digital signature. Relays whose signature is in any way different from the original can be considered potentially dangerous.

Another Sybilhunter program is able to detect entire sets of relays, which are probably controlled by one person. There is a good chance that such a person will use the servers for hacker attacks. Among other things, Sybilhunter can create graphical images to illustrate the server availability graph in Tor. This, in turn, allows the definition of relays that are controlled by one "center".

The figure shows a visualization of the uptime of some servers inTor, as of part of January 2014. The red color shows the exit areas, which are very likely to be controlled by the same person.

Tor Project research has identified a wide range of potentially dangerous servers.

9. Tuning Tor

Some of them try to steal registration information from popular websites and services. Others block certain sites within certain countries, forming a censoring system. There are also nodes that attack Bitcoin wallets in order to take possession of the victim's virtual currency!

It is fair to say that hazardous or likely hazardous output relays are an absolute minority in the entire TOR network. The chances of hitting them by accident are minimal. In addition, the "HTTPS-Everywhere" utility is built into the Tor browser, which will prevent an attacker from achieving their goals, or minimize harm.

What is Tor Browser

Full name: Tor Browser Bundle. Built on the platform Mozilla Firefox and is one of the most anonymous browsers in the world. Changes your IP address to a random IP address when using the Internet.

Tor Browser: specify which region to use

Uses IP of different countries: Romania, Luxembourg, Switzerland, Germany. Does not store cookies and a log of visited sites, does not remember logins and passwords. Uses a special secure network of anonymous proxy servers.

Installing Tor

You can download this browser from the official website: https://www.torproject.org/download/download-easy.html.en

Select your language and click Download Tor Browser Bundle:

Run the downloaded file:

Click on OK:

Install:

Ready:

Using the Tor Browser

Run the program. If you haven't unchecked Launch Tor Browser Bundle after the installation is finished, it will start automatically.

On first launch, you will see a window Network settings Tor... Here you need to select the type of connection. Nowadays, in most cases, the first option is suitable - the button Connect:

After that, the browser connects to the Tor network, which will hide your real IP address, ensuring your anonymity. Wait for the network connection:

For more privacy, you can request the English versions of the pages. But this is not a key indicator of anonymity. You can press No:

The Tor browser is not installed in the system in the traditional way, because is a portable application. The program can be carried with you on a USB flash drive. By default, when unpacked, it is placed in the folder Tor browser on the desktop:

You can move the browser folder to any location. When you want to run the TOP for anonymous visiting of any site, enter the program folder and run the file Start Tor Browser.exe:

After pressing the button New personality and before using the new IP, go to 2ip.ru and see what has changed.


To imitate a different personality, it is desirable to change not only the IP, but also the country. Press the button if necessary. Tor, select item New personality (New Identity) until the country changes:

Attention! Due to the fact that, while working through Tor, the browser traffic goes through many proxy servers, the page loading speed is much lower than through a regular browser.

Also read our article on how to use the secure Tor network on Andoid devices.

It might be interesting:

Configuring the Tor browser

If you do not know what a Tor browser is, then read the article What is the Tor network.

Download Tor Browser only from the official website torproject.org.

Be careful! There are sites that mimic the Tor project site. For example, torprojectS.org (added an S at the end) is trying to install a Trojan on your computer. DO NOT download Tor Browser from third party sites.

By the way, Tor Browser is made on the basis of the Mozilla Firefox browser, since it is the only browser that can independently work with Socks connection without participation operating system.

Download Tor Browser from torproject.org

After installing Tor Browser is completely ready to work.

Below is a screenshot from the official website.

  • do not install additional plugins, as there is a possibility of installing a plugin that will give out your real location. All the necessary plugins for anonymity are already installed.
  • do not open documents (such as PDF and DOC) downloaded from the Tor Browser while you are online. Macros can be embedded in such files that request access to the Internet directly through the program, bypassing the Tor network. This will compromise your real IP address.
  • do not download torrents on the Tor network, as this will increase the network load. Torrent programs are designed in such a way that they always access the Internet directly and do not take into account proxy settings. This could compromise your real IP address.
  • always use https connection. Such a connection will ensure the security of data transmission.

The main Tor Browser window.

For security settings, click Security Settings.

Configure the security level:

  • Low (default) - standard security level.
  • Suitable for most users. Websites open correctly and nothing is blocked.

  • Medium - Javascript is blocked on sites where https is not supported. HTML5 video and audio is clickable via NoScript plugin
  • High - Javascript is blocked on all websites. HTML5 video and audio is launched with a click through the NoScript plugin. Some types of pictures, fonts and icons are forbidden to download
  • Since most websites use Javascript, it is problematic to view websites in High mode, as some of the content is hidden. We recommend this mode when you need to read an article on a website, and you do not need to log in to the site.

Tor Browser is ready to go and you can start surfing anonymously right away.

Remember, with this setup, only the Tor Browser uses the Tor network. All other programs use a direct Internet connection and pass your real IP address.

What to do with programs that cannot directly work with the Socks protocol? For example, mail clients, other browsers, programs instant messaging etc. We recommend using Proxifier to redirect the traffic of such programs to the Tor network.

Configuring Proxifier over the Tor network

Proxifier can:

  • redirect traffic from all operating system programs through a proxy (including email clients, all browsers, instant messaging programs)
  • create proxy chains
  • use a proxy DNS server, hiding the real DNS of the ISP
  • supports http and socks proxies

Download Proxifier for Windows Download Proxifier for macOS

The main page of the Proxifier official website.

Install the Proxifier program.

This program is able to collect all the traffic of the operating system and pass it through a specific proxy server.

To configure Proxifier, you need to know the used Tor network port. Go to the Preferences section of the Tor Browser.

Select the Network Settings section.

Look at the local IP address used and the Tor connection port. This data must be inserted into the Proxifier program so that all operating system traffic goes to the Tor network. In our example, 127.0.0.1 and port 9150.

Run the Proxifier program.

ATTENTION!

Browser Tor how to choose a country

It is important to first launch Tor Browser and wait until the main window appears. And only after that start the Proxifier program.

Click on the Proxies button.

Click the Add button.

Enter the IP address and port. In our example: 127.0.0.1 and port 9150.

Select Yes - you agree to use this default proxy.

Open any browser or email program. In Proxifier, you will see a list of connections through the Tor network. In any browser, you can check your IP address and make sure that the IP address from the Tor network will be shown, and not your real IP address.

If something doesn't work, then close Tor Browser and Proxifier. And then launch Tor Browser and wait for the main window to appear. Then start Proxifier. You don't need to make any additional settings. All traffic will automatically go through the Tor network. Close Proxifier to get your real IP address back.

Tor browser via country specific IP addresses.

Recently, an acquaintance knocked on my door with a request to help her in a delicate matter. She wanted to wind up voices in some girly photo contest. I don’t understand who cares about it, people have nothing to do. If I could receive any prizes (which is also not entirely fair), as I understand it, but really a naive user of the Russian Internet does not yet understand that participation in some contests or reposts in VKontakte with promising and flashy names like “Make a repost”, "Hit the button I like", "Spit over my right shoulder", "And get a super-super graphics card" or "Razer Mamba gaming mouse" will give him the opportunity to get something for free?

Okay, something I got carried away. So, one of the conditions of the competition was that the voting people should be located on the territory of Russia. Those. The IP addresses of the users who vote must be from Russia. And she lives in Ukraine. I thought so far to throw her a list of checked ones, and then use the Proxy Switcher program to solve this issue.

But then after thinking a little, I decided to go a simpler way, nooo ... and not because she is blonde, I really love women and blondes in particular :)! Just like, I'm a little lazy person, looking for something easier. I decided, having finished a little, to throw her beloved, slightly modified Tor Browser to her.

We wrote about Tor in detail in this article "". If you are not already familiar with this secure browser based on anonymous network, I recommend to read.

Tor work through IP addresses of a specific country

The Tor network works randomly, i.e. goes online through a constantly changing chain of nodes, and each time your computer is assigned a different IP address for different countries. And we only need Russian!

So, how to configure Tor so that it always gets the IP of a certain weird. For this we need, if you do not have it yet. In the drop-down menu, you can select the interface language. There is also Russian!

Turn on Thor. If you see a green onion and the inscription "Connected to the Tor network" go ahead.

In the same window, click on the Settings button

In the window that appears, go to the Additional tab. Click on the button Edit current torrc... In the torrc editing window, at the very bottom, at the end, add the line ExitNodes (ru). Check the box Apply Selected and click OK

Now let's reload the browser. After launching Tor Browser from all kinds of IPs, it will select only Russian IP-addresses, and change only to Russian by pressing the button Change identity.

Thus, you can customize the browser to your liking. For example:

  • Work across any country
    ExitNodes (country code)
  • Work only through specified countries (multiple countries).
    ExitNodes (ua), (ug), (kp), (ru)
  • Block work across a specific country.
    ExcludeExitNodes (de)

Free download

Well, now you know how to make Tor work with the IP addresses of a specific country. Like the article press the button social network! And do not forget to subscribe to us on VKontakte, classmates, Twitter and Facebook, so as not to miss the news and always be aware of.