Chapter 4b. Using the Tor Browser.
It may seem redundant to have an instructional section on something as simple to use as a
web browser. However, your web browser is often the most common piece of software that
attackers will manipulate to exploit you. The Tor Project has done a very good job in making the
Tor Browser as secure as possible. However, due to a debate about the trade off between usability
is often a vulnerable vector that is leveraged by attackers, with one of the most notorious recent
examples involving infecting everyone who visited any server hosted by “Freedom Networking” on
the Tor Hidden Network with malware that exposed their real IP address. Whonix provides a very
good safe guard against leaking one's real IP address. But, there is no good reason to leave a door
open for malware infections. This chapter will instruct you on how to install the Tor Browser in
default, that comes pre-installed in the Tor Browser.
1. The Tor Browser does not come pre-installed on Whonix by default. However, the Whonix
Team has included a script on the Desktop that will install the Tor Browser. Thus, you first
need to double click on the “Update Tor Browser” icon on your desktop.