Tor Browser is a web browser based on Mozilla Firefox and configured to protect your anonymity. Given the popularity of Firefox, you might have used it before and its user interface is like any other modern web browser.

Some frequently asked questions about the browser can be found in the FAQ.

Aqui estão algumas coisas que valem a pena serem mencionadas no contexto do Tails.

If you want to browse web pages on your local network, refer to our documentation on accessing resources on the local network.

AppArmor confinement

Tor Browser in Tails is confined with AppArmor to protect the system and your data from some types of attack against Tor Browser. As a consequence, it can only read and write to a limited number of folders.

This is why you might face Permission denied errors, for example if you try to download files to the Home folder.
  • You can save files from Tor Browser to the Tor Browser folder that is located in the Home folder. The content of this folder will disappear once you shut down Tails.

  • If you want to upload files with Tor Browser, copy them to that folder first.

  • If you have activated the Personal Data persistence feature, then you can also use the Tor Browser folder that is located in the Persistent folder. In that case, the content of this folder is saved and remains available across separate working sessions.

To be able to download files larger than the available RAM, you need to activate the Personal Data persistence feature.

Criptografia HTTPS

Usar HTTPS ao invés de HTTP criptografa sua comunicação enquanto estiver navegando na web.

Todos os dados trocados entre seu navegador e o servidor são criptografados. Isto evita que o nó de saída do Tor grampeie sua comunicação.

HTTPS também inclui mecanismos de autenticação do servidor com o qual você está se comunicando. Mas estes mecanismos podem ser falhos, como explicado na nossa página de advertências.

For example, here is how the browser looks like when we try to log in an email account at, using their webmail interface:

Notice the padlock icon on the left of the address bar saying "" and the address beginning with "https://" (instead of "http://"). These are the indicators that an encrypted connection using HTTPS is being used.

Você deve tentar usar somente serviços providos através de HTTPS quando estiver enviando ou recebendo informações sensíveis (como senhas), pois de outra forma é muito fácil para um bisbilhoteiro roubar quaisquer informações que você estiver enviando ou modificar o conteúdo de uma página no caminho até o seu navegador.

HTTPS Everywhere

HTTPS Everywhere is a Firefox extension included in Tor Browser and produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by rewriting all requests to these sites to HTTPS.

Para saber mais sobre o HTTPS Everywhere, você pode ver:


O Tor sozinho não é suficiente para proteger sua anonimidade e privacidade para navegar na web. Todos os navegadores modernos, como o Firefox, têm suporte a JavaScript, Adobe Flash, cookies e outros serviços que foram demonstrados serem problemas para a anonimidade provida pela rede Tor.

In Tor Browser all such features are handled from inside the browser by an extension called Torbutton which does all sorts of things to prevent the above type of attacks. But that comes at a price: since this will disable some functionalities and some sites might not work as intended.

Proteção contra JavaScript perigoso

Desabilitar todo JavaScript por padrão desabilitaria um monte de scripts inofensivos e possivelmente úteis, e poderia inutilizar muitos sítios.

That's why JavaScript is enabled by default in Tor Browser.

Mas nós confiamos no Torbutton para desabilitar todo JavaScript potencialmente perigoso.

Nós consideramos isto um compromisso necessário entre segurança e usabilidade. Além do que, até hoje não estamos cientes de nenhum JavaScript que possa comprometer a anonimidade do Tails.

To understand better the behavior of Tor Browser, for example regarding JavaScript and cookies, you can refer to the Tor Browser design document.

Security slider

You can use the security slider of Torbutton to disable browser features as a trade-off between security and usability. For example, you can use the security slider to disable JavaScript completely.

The security slider is set to low by default. This value provides the default level of protection of Torbutton and the most usable experience.

To change the value of the security slider, click on the green onion button and choose Privacy and Security Settings.

Security slider in its default value (low)

Circuit view feature

The Circuit view feature of Torbutton shows you the three Tor relays used for the website in the current tab, including the corresponding IP addresses and the countries they're located in. The node immediately above the Internet node is the Exit relay; the country it is located in might determine how the website is presented to you. You can use New Tor Circuit for this Site to change to another country.

You can use Onion Circuits to get more detailed information about the circuits being used.

New Tor Circuit for this Site feature

The New Tor Circuit for this Site feature of Torbutton builds a new Tor Circuit for the website in the current tab and reloads it. This is particularly useful if the Exit relay is located in a country which negatively affects the presentation of the website you are visiting, e.g. due to censorship, localization into a language you do not know, and similar.

To use it, click on the green onion button and select New Tor Circuit for this Site.

New Identity feature

The New Identity feature of Torbutton:

  • Closes all open tabs.
  • Clears the session state including cache, history, and cookies (except the cookies protected by the Cookie Protections feature).
  • Closes all existing web connections and creates new Tor circuits.
  • Erases the content of the clipboard.

To use this feature click on the green onion button and select New Identity.

This feature is not enough to strongly separate contextual identities in the context of Tails as the connections outside of Tor Browser are not restarted.

Shutdown and restart Tails instead.

For more details, see the design and implementation of the Tor Browser.

Use o NoScript para ter ainda mais controle sobre JavaScript

To allow more control over JavaScript, for example to disable JavaScript completely on some websites, Tor Browser includes the NoScript extension.

Por padrão, o NoScript fica desabilitado e uma certa quantidade de JavaScript é permitida pela extensão Torbutton, como explicado acima.

Para mais informações, você pode ver o website e as funcionalidades do NoScript.