More info on Secure Anonymous Submissions

Twitter icon
Facebook icon

<-Back

TOR browser creates a "onion ring" network, by swapping out your ip address before being passed through a total of seven anonymising relays.  TOR submissions are impossible to retrace.  However, if you are accessing TOR download page from your office, your internal Internet network logs records your computer accessed the TOR browser download page and this might expose you to scrutiny.  Network administrators are unable to know what you have uploaded however if you have used TOR.  It would be highly recommended that you download and install the TOR browser for submission of sensitive documents or information from your OWN PERSONAL COMPUTER.

What is the Tor Browser Bundle (TBB)?

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can also run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.

Quick videos on how to use the TOR BROWSER

How to download and use Tor Browser in different operating systems:

Microsoft Windows VIDEO    Apple OSX  VIDEO     Linux  VIDEO