Dark Web Guides

Tor Browser for Windows — Complete Setup Guide

Windows is the most popular operating system, and setting up Tor Browser on Windows is straightforward — but there are Windows-specific security considerations you need to address. This guide walks you through downloading, installing, configuring, and securing Tor Browser on Windows 10 and Windows 11 in 2026, including VPN integration and advanced privacy settings.

Need this done for your project?

We implement, you ship. Async, documented, done in days.

Start a Brief

Downloading and Installing Tor Browser

Follow these steps for a safe installation on Windows:

  1. Download from torproject.org ONLY: Go to torproject.org/download and download the Windows installer. Never download from third-party sites, mirrors, or search engine ads — malicious versions exist.
  2. Verify the download (recommended): The Tor Project provides GPG signatures for every release. Download the .asc signature file and verify it using GPG. This confirms the file hasn't been tampered with.
  3. Run the installer: Double-click the downloaded .exe file. Windows Defender may show a SmartScreen warning ("Windows protected your PC") — click "More info" → "Run anyway." This warning appears because Tor Browser isn't signed with a Microsoft certificate, not because it's malicious.
  4. Choose installation location: The default location is your Desktop. You can install it anywhere, but avoid Program Files (requires admin permissions that could leave traces).
  5. Launch Tor Browser: Open the Tor Browser folder and double-click "Start Tor Browser." Click "Connect" and wait 10-30 seconds for the Tor connection to establish.

Windows-Specific Security Configuration

Windows has several features that can compromise your privacy when using Tor:

  • Disable Windows telemetry: Go to Settings → Privacy & Security → Diagnostics & feedback → Set to "Required diagnostic data only." Windows sends significant telemetry data to Microsoft by default.
  • Turn off Windows Defender cloud samples: Settings → Privacy & Security → Windows Security → Virus & threat protection → Manage settings → Turn off "Cloud-delivered protection" and "Automatic sample submission" to prevent files from being sent to Microsoft.
  • Disable Cortana/Copilot: These features send data to Microsoft. Disable them in Settings.
  • Configure Windows Firewall: Add Tor Browser as an allowed application. Windows Firewall may block Tor connections otherwise. Go to Control Panel → Windows Defender Firewall → Allow an app → Add Tor Browser.
  • Disable WebRTC in Tor Browser: Already disabled by default in Tor Browser, but verify by visiting a WebRTC leak test site.
  • Consider full-disk encryption: Enable BitLocker (Windows Pro) or use VeraCrypt (Windows Home) to encrypt your drive. If your computer is seized, Tor Browser data on an unencrypted drive could be recovered.

Setting Up VPN + Tor on Windows

The recommended setup is VPN → Tor (connect to VPN first, then open Tor Browser):

  1. Install a VPN client: Mullvad (best privacy — accepts Monero, no email required), ProtonVPN (free tier available), or IVPN
  2. Connect to VPN: Open your VPN app and connect to a server. Choose a privacy-friendly country like Switzerland, Iceland, or Sweden.
  3. Enable kill switch: Most VPN apps have a "kill switch" that blocks all internet if the VPN disconnects. Enable this to prevent accidental Tor traffic without VPN protection.
  4. Launch Tor Browser: With VPN connected, open Tor Browser and connect to Tor.
  5. Verify: Check your setup at check.torproject.org — it should confirm you're using Tor. Your ISP sees VPN traffic, the VPN provider sees Tor traffic, and Tor sees your anonymous browsing.

Pro tip: Use WireGuard protocol in your VPN app for the fastest speeds with minimal overhead on top of Tor.

Take Your Privacy Further with Tor Hosting

Once you're comfortable with Tor on Windows, consider hosting your own .onion service. Whether it's a personal blog, forum, or web application, you can make it accessible via the Tor network.

AnubizHost provides managed Tor hosting:

  • Pre-configured v3 .onion addresses — no need to configure Tor yourself
  • Offshore servers in Iceland, Romania, and Finland — strong privacy laws
  • Full root access with Linux (not Windows) servers optimized for Tor
  • Bitcoin, Monero, and crypto payments — no KYC required
  • DDoS protection and 24/7 uptime monitoring for your .onion services

Why Anubiz Labs

100% async — no calls, no meetings
Delivered in days, not weeks
Full documentation included
Production-grade from day one
Security-first approach
Post-delivery support included

Ready to get started?

Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.

Support Chat

Online