Tor Tutorials
Tor Security Best Practices
Using Tor doesn't automatically make you anonymous. Your behavior determines your security. These best practices prevent the most common mistakes that Tor users make — mistakes that can reveal your real identity.
Need this done for your project?
We implement, you ship. Async, documented, done in days.
Critical Rules
- Never use Tor and non-Tor browsers simultaneously — Correlation attacks can link your Tor and non-Tor activities by timing.
- Never log into personal accounts — One login to your real Gmail through Tor links your anonymous session to your identity.
- Keep Tor Browser at default window size — Resizing creates a unique fingerprint. Tor Browser starts at a specific size to blend in.
- Don't install browser extensions — Extensions change your fingerprint and may leak data outside Tor.
- Use the highest security level you can tolerate — "Safest" disables JavaScript, which is the #1 de-anonymization vector.
- Never open downloaded files while connected — PDFs, DOCs, and other files can make external connections that reveal your IP.
Advanced Protection
- Use VPN + Tor — Connect to a VPN first, then Tor. Your ISP can't see you use Tor.
- Use Tails or Whonix — Full OS-level protection instead of just browser-level.
- Separate identities completely — Each anonymous identity should use different circuits, different sessions, different behavioral patterns.
- Be aware of writing style analysis — Stylometry can identify you by how you write. Vary your style for different identities.
- Use cryptocurrency for payments — Monero (XMR) is preferred for privacy. Bitcoin is pseudonymous, not anonymous.
Common De-Anonymization Attacks
- Traffic correlation — An attacker watching both ends of your connection can correlate timing. Use VPN to prevent ISP-side observation.
- JavaScript exploits — Malicious JavaScript can reveal your real IP. Use "Safest" security level.
- Browser fingerprinting — Window size, installed fonts, timezone, and other browser properties can identify you. Don't modify Tor Browser.
- Behavior patterns — Logging in at the same time every day, using the same phrases, or accessing the same sites creates patterns.
Secure Your .onion Service with AnubizHost
If you're running a .onion service, server-side security is equally important. AnubizHost provides hardened Tor hosting with IP leak prevention, DDoS protection, and offshore jurisdiction — so your service is as secure as your browsing.
Related Services
Why Anubiz Labs
100% async — no calls, no meetings
Delivered in days, not weeks
Full documentation included
Production-grade from day one
Security-first approach
Post-delivery support included
Ready to get started?
Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.