Tudo que você faz na Internet usando Tails passa pela rede Tor.

Tor criptografa e anonimiza suas conexões ao passá-las por 3 "relays" (servidores de repetição) aleatórios diferentes. Os relays do Tor são servidores operados por diferentes pessoas e organizações em todo o mundo.

A Tor connection goes through 3 relays with the last one establishing the actual connection to the final destination

Você não poderá acessar a internet a partir do Tails até que a conexão com a rede Tor esteja estabelecida. Por exemplo, o Navegador Tor mostra a seguinte mensagem de erro Proxy servers refusing connections até que a conexão com a rede Tor esteja estabelecida.

Because Tor routes your Internet traffic through 3 relays before reaching its destination, the connection is slower than when your are not using Tor.

See our documentation on why Tor is slow.

Para se conectar à rede Tor:

  1. Conecte-se a uma rede local, cabeada, Wi-Fi, ou móvel.

  2. O assistente de Conexão Tor aparece para te ajudar com a conexão à rede Tor.

  3. Escolha se você quer:

    • Conectar à rede Tor automaticamente

    • Esconder da sua rede local que você está conectado à rede Tor

    As implicações de ambos os métodos estão detalhadas abaixo.

Retransmissores (relays) e pontes (bridges) da rede Tor

-Relays públicos do Tor

Na maior parte do tempo, sua rede local não bloqueia o acesso à rede Tor e você pode usar um relé público como seu primeiro relé do Tor.

Ao usar um relay público para entrar na rede Tor, qualquer análise simples do tráfego de dados na sua rede local permite concluir que você está se conectando à rede Tor, mas sua atividade online se manterá segura e anônima.

  • Tor bridges

    Tor bridges are secret Tor relays that keep your connection to the Tor network hidden.

    Use a bridge as your first Tor relay if connecting to Tor is blocked or if using Tor could look suspicious to someone who monitors your Internet connection.

    The technology used by Tor bridges is designed to circumvent censorship where connections to Tor are blocked, for example in some countries with heavy censorship, by some public networks, or by some parental controls.

    It does so by camouflaging your connection so it cannot be recognized as a connection to Tor. As a consequence, the same technology can be used to hide that you are using Tor if it could look suspicious to someone who monitors your Internet connection.

    Tor bridges are often less reliable and slower than public Tor relays.

Connecting to Tor automatically

We recommend connecting to Tor automatically if you are on a public Wi-Fi network or if many people in your country use Tor to circumvent censorship.

When you choose this option, Tails tries different ways of connecting to Tor until it succeeds:

  1. Tails tries to connect to Tor directly using public relays, without using bridges.

  2. Tails tries to connect to Tor using one of the default bridges, already included in Tails, if connecting using public relays fails.

  3. Tails asks you to configure a custom bridge, if connecting using the default bridges fails.

Someone monitoring your Internet connection could identify these attempts as coming from a Tails user.

If connecting to Tor automatically fails, the Tor Connection assistant helps you:

In the future, Tails will also automatically:

  • Detect if you have to sign in to the local network using a captive portal (#5785)

Hiding to your local network that you are connecting to Tor

You might need to go unnoticed if using Tor could look suspicious to someone who monitors your Internet connection.

When you choose this option, Tails will only connect to Tor after you configure a Tor bridge. Bridges are secret Tor relays that hide that you are connecting to Tor.

It is impossible to hide to the websites that you visit that you are using Tor, because the list of exit nodes of the Tor network is public.

Our team is doing its best to help you connect to Tor using the most discrete types of Tor bridges. That is why, when you decide to hide that you are connecting to Tor:

  • Default bridges are not available.

    You will have to know the address of a custom bridge.

    To request custom bridges, you can either:

    1. Request bridges on https://bridges.torproject.org/.

      We recommend doing so before starting Tails and ideally from a different local network than the one on which you want to hide that you are using Tor.

    2. Send an empty email to bridges@torproject.org from a Gmail or Riseup email address.

      Sending such an email, from your phone for example, does not reveal to your local network that you are trying to connect to Tor.

  • You can only use the types of bridges that our team considers discrete enough.

    Currently in Tails, only obfs4 bridges hide that you are using Tor.

  • To save the last Tor bridge that connected to Tor successfully, turn on the Tor Bridge feature of the Persistent Storage.

In the future, we will make it easier to use custom bridges by:

Troubleshooting Tor bridges

If connecting to Tor using a custom bridge fails, the Tor Connection assistant helps you:

The computer clock is set to an incorrect time zone

For Tor bridges to work, the clock of your computer must be correct.

Choose Fix Clock in the error screen of the Tor Connection assistant to set the time zone and time of your computer.

You did not enter the bridge correctly

An obfs4 bridge looks like:

obfs4 1.2.3.4:1234 B0E566C9031657EA7ED3FC9D248E8AC4F37635A4 cert=OYWq67L7MDApdJCctUAF7rX8LHvMxvIBPHOoAp0+YXzlQdsxhw6EapaMNwbbGICkpY8CPQ iat-mode=0

You need to enter the entire line, not just the IP address and port combination.

The bridge is no longer operational

It is possible that the bridge that you entered is no longer working.

Try entering another bridge or requesting other bridges.

Viewing the status of Tor

The status of Tor appears as an onion icon in the notification area:

  • Onion icon You are connected to Tor.

  • Onion icon that is crossed
out You are not connected to Tor.