Tor Browser Without Tor

First things first, this post is my personal opinion and is being posted on my professional blog. If you are in the information security field and are not aware of the following process, you should be. It is part of our professional responsibility to know how these things work. I’ll be using Fedora, thus the use of dnf. Everything else in this post should be distribution agnostic.

Using Tor as a SOCKS proxy might be a better title for this post. One issue I’d like to resolve using this method is in regard to accessing Tor via a bridge. To do that, using the Tor browser is recommended. Although, it should be possible to do this without requiring the use of the Tor browser. Otherwise, IMHO, that would not be very good software engineering with regard to freedom.

The NSA has attempted to break the Tor browser’s encryption and has been successful to a small extent. You must have read our dedicated article on how true Identity of tor users can be hacked. You can run tor.exe without Tor browser in this way: 1) Copy torrc.defaults into the directory in which tor.exe is 2) Open cmd prompt windows 3) chdir to the directory where tor.exe is. Onion Search Engine How to Browse The Deep Web Without Tor by Janeth Kent Date: security deepweb darkweb onion tor The general recommendation does not change: Anyone interested in entering the Deep Web will get a more complete and secure experience by downloading a copy of the Tor Browser, and modifying various browsing habits. I would be skeptical of the article you read. The TOR Browser Bundle (TBB) is safe in most instances. The admonishment to not use Windows if possible is a good one, but unless you are doing some really bad stuff, it is probably 'safe enough' (Linux is always preferable though).

Install required packages, not a complete list.

Compile and install Tor

The default branch is currently master. However, depending on your use case, you will likely want to use a specific version of Tor. To find out what versions are available, the following git commands can be used.

The Tor repository uses annotated tags. Annotated tags can be used checked out with
git checkout.

The branches aren’t as granular as the tags. You’ll want to use the tag when running git checkout.


To determine which version to use you can check a few things.

This files usually contains something similar to the following..

You can also check the ChangeLog file.

I’ll be using Tor as a SOCKS proxy to the internet so I’ll be using in this example.

If you’ll be running a relay or bridge, you’ll want to make sure you compile the recommended release, usually latest stable release. In this example that would be but, as stated in the ReleaseNotes file, others are probably okay sticking with If the word ‘probably’ concerns you then just use and sleep a little bit better.

More information on running a relay is available at the following link.

Checking out a tag will put your repo in a detatched HEAD state. This is OK and is to be expected.

I’m going to install Tor into my ~/local/ directory. Modify this to suit your needs by using the

option to the configure script.

Confirm the verison that was just installed.

You can configure Tor be editing ~local/etc/tor/torrc, otherwise Tor
will try to use reasonable defaults.

I recommend not using the default port, 9050. An Nmap scan of that port will return the following

This is a clear indication that Tor is running on your machine. Using a port such as 8000 might be more acceptable.

Modify the SOCKSPort line.

An Nmap scan of port 8000 produces the desired result.

Now, configure your browser of choice to use the Tor SOCKS proxy listening at

**** Be sure to disable all JavaScript ****

Test your connection using the method of your choice. One option is below.

Tor Browser Without Torrents

You can verify IPv6 address by using the host command.

Access Dark Web Without Tor