Tor Browser for Windows — Complete Setup Guide
Windows is the most popular operating system, and setting up Tor Browser on Windows is straightforward — but there are Windows-specific security considerations you need to address. This guide walks you through downloading, installing, configuring, and securing Tor Browser on Windows 10 and Windows 11 in 2026, including VPN integration and advanced privacy settings.
Need this done for your project?
We implement, you ship. Async, documented, done in days.
Downloading and Installing Tor Browser
Follow these steps for a safe installation on Windows:
- Download from torproject.org ONLY: Go to torproject.org/download and download the Windows installer. Never download from third-party sites, mirrors, or search engine ads — malicious versions exist.
- Verify the download (recommended): The Tor Project provides GPG signatures for every release. Download the .asc signature file and verify it using GPG. This confirms the file hasn't been tampered with.
- Run the installer: Double-click the downloaded .exe file. Windows Defender may show a SmartScreen warning ("Windows protected your PC") — click "More info" → "Run anyway." This warning appears because Tor Browser isn't signed with a Microsoft certificate, not because it's malicious.
- Choose installation location: The default location is your Desktop. You can install it anywhere, but avoid Program Files (requires admin permissions that could leave traces).
- Launch Tor Browser: Open the Tor Browser folder and double-click "Start Tor Browser." Click "Connect" and wait 10-30 seconds for the Tor connection to establish.
Windows-Specific Security Configuration
Windows has several features that can compromise your privacy when using Tor:
- Disable Windows telemetry: Go to Settings → Privacy & Security → Diagnostics & feedback → Set to "Required diagnostic data only." Windows sends significant telemetry data to Microsoft by default.
- Turn off Windows Defender cloud samples: Settings → Privacy & Security → Windows Security → Virus & threat protection → Manage settings → Turn off "Cloud-delivered protection" and "Automatic sample submission" to prevent files from being sent to Microsoft.
- Disable Cortana/Copilot: These features send data to Microsoft. Disable them in Settings.
- Configure Windows Firewall: Add Tor Browser as an allowed application. Windows Firewall may block Tor connections otherwise. Go to Control Panel → Windows Defender Firewall → Allow an app → Add Tor Browser.
- Disable WebRTC in Tor Browser: Already disabled by default in Tor Browser, but verify by visiting a WebRTC leak test site.
- Consider full-disk encryption: Enable BitLocker (Windows Pro) or use VeraCrypt (Windows Home) to encrypt your drive. If your computer is seized, Tor Browser data on an unencrypted drive could be recovered.
Setting Up VPN + Tor on Windows
The recommended setup is VPN → Tor (connect to VPN first, then open Tor Browser):
- Install a VPN client: Mullvad (best privacy — accepts Monero, no email required), ProtonVPN (free tier available), or IVPN
- Connect to VPN: Open your VPN app and connect to a server. Choose a privacy-friendly country like Switzerland, Iceland, or Sweden.
- Enable kill switch: Most VPN apps have a "kill switch" that blocks all internet if the VPN disconnects. Enable this to prevent accidental Tor traffic without VPN protection.
- Launch Tor Browser: With VPN connected, open Tor Browser and connect to Tor.
- Verify: Check your setup at check.torproject.org — it should confirm you're using Tor. Your ISP sees VPN traffic, the VPN provider sees Tor traffic, and Tor sees your anonymous browsing.
Pro tip: Use WireGuard protocol in your VPN app for the fastest speeds with minimal overhead on top of Tor.
Take Your Privacy Further with Tor Hosting
Once you're comfortable with Tor on Windows, consider hosting your own .onion service. Whether it's a personal blog, forum, or web application, you can make it accessible via the Tor network.
AnubizHost provides managed Tor hosting:
- Pre-configured v3 .onion addresses — no need to configure Tor yourself
- Offshore servers in Iceland, Romania, and Finland — strong privacy laws
- Full root access with Linux (not Windows) servers optimized for Tor
- Bitcoin, Monero, and crypto payments — no KYC required
- DDoS protection and 24/7 uptime monitoring for your .onion services
Related Services
Why Anubiz Labs
Ready to get started?
Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.