Tor Browser is a privacy-focused web browser that routes your internet traffic through the Tor network – a decentralized overlay network of thousands of volunteer-operated relays worldwide. Each connection passes through at least three relays, encrypting your data at every hop, which makes it extremely difficult for anyone to trace your browsing activity back to your real IP address.
There are plenty of legitimate reasons to use Tor Browser. Journalists and activists in countries with heavy censorship rely on it to communicate safely and access blocked information. Privacy-conscious users turn to it when they want to browse without being tracked by advertisers or ISPs. Security researchers use it to test anonymity tools and investigate threats. If you value your online privacy, Tor Browser is one of the most effective tools available.
This guide walks you through installing Tor Browser on Ubuntu 24.04, Linux Mint 22, and Debian 13 using three different methods. Pick the one that fits your workflow best.
Prerequisites
Before you start, make sure you have the following in place:
- A running installation of Ubuntu 24.04, Linux Mint 22, or Debian 13
- A user account with sudo privileges
- An active internet connection
- Terminal access
Start by updating your system packages:
sudo apt update && sudo apt upgrade -y
Method 1: Install Tor Browser Using Flatpak (Recommended)
Flatpak is the simplest way to install Tor Browser on any of these distributions. The package is maintained on Flathub and stays up to date automatically.
Step 1: Install Flatpak
If Flatpak is not already installed on your system, install it now:
sudo apt install -y flatpak
Step 2: Add the Flathub Repository
Add Flathub as a Flatpak remote source:
sudo flatpak remote-add --if-not-exists flathub https://dl.flathub.org/repo/flathub.flatpakrepo
Step 3: Install Tor Browser
Install the Tor Browser Flatpak package:
flatpak install -y flathub com.github.nickvergessen.TorBrowser
Wait for the download and installation to complete. Depending on your internet speed, this may take a few minutes.
Step 4: Verify the Installation
Confirm Tor Browser is installed:
flatpak list | grep -i tor
You should see an entry for Tor Browser in the output.
Step 5: Launch Tor Browser
Start Tor Browser from the command line:
flatpak run com.github.nickvergessen.TorBrowser
You can also launch it from your application menu by searching for “Tor Browser”.
Method 2: Install Tor Browser from the Official Tarball
Downloading the official tarball directly from the Tor Project website gives you full control over the installation. This method includes GPG signature verification to confirm the package has not been tampered with.
Step 1: Download Tor Browser
Head to your home directory and download the latest Tor Browser package along with its GPG signature file:
cd ~
TOR_VERSION="14.0.7"
wget https://www.torproject.org/dist/torbrowser/${TOR_VERSION}/tor-browser-linux-x86_64-${TOR_VERSION}.tar.xz
wget https://www.torproject.org/dist/torbrowser/${TOR_VERSION}/tor-browser-linux-x86_64-${TOR_VERSION}.tar.xz.asc
Note: Check the Tor Project download page for the latest version number and update the TOR_VERSION variable accordingly.
Step 2: Import the Tor Project GPG Signing Key
Import the Tor Browser Developers signing key so you can verify the download:
gpg --auto-key-locate nodefault,wkd --locate-keys [email protected]
You should see output indicating that the key was imported successfully. The fingerprint for the Tor Browser Developers key is EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290.
Step 3: Verify the GPG Signature
Verify that the downloaded tarball is authentic:
gpg --verify tor-browser-linux-x86_64-${TOR_VERSION}.tar.xz.asc tor-browser-linux-x86_64-${TOR_VERSION}.tar.xz
Look for Good signature from "Tor Browser Developers" in the output. If you see a warning about the key not being certified with a trusted signature, that is normal – it just means you have not personally signed the Tor Project’s key in your keyring.
Step 4: Extract the Archive
Extract the tarball to your home directory:
tar -xJf tor-browser-linux-x86_64-${TOR_VERSION}.tar.xz
This creates a directory called tor-browser in your home folder.
Step 5: Move to /opt (Optional but Recommended)
For a cleaner setup, move the extracted directory to /opt:
sudo mv tor-browser /opt/tor-browser
Step 6: Register the Desktop Application
Run the desktop registration script so Tor Browser appears in your application menu:
cd /opt/tor-browser
./start-tor-browser.desktop --register-app
Step 7: Launch Tor Browser
Start Tor Browser:
/opt/tor-browser/start-tor-browser.desktop
Verify the installation by confirming the browser opens and connects to the Tor network without errors.
Method 3: Install Tor Browser Using torbrowser-launcher
The torbrowser-launcher package is available in the default repositories. It handles downloading, verifying, and updating Tor Browser for you.
Step 1: Install torbrowser-launcher
sudo apt install -y torbrowser-launcher
Step 2: Launch and Download Tor Browser
Run the launcher for the first time:
torbrowser-launcher
On the first run, the launcher downloads the latest version of Tor Browser, verifies the GPG signature, and extracts it automatically. This process takes a few minutes depending on your connection speed.
Step 3: Verify the Installation
After the download completes, Tor Browser launches automatically. Confirm it connects to the Tor network successfully. You can also find “Tor Browser” in your application menu for future launches.
Configuring Tor Browser
Once Tor Browser is running, there are a few settings worth configuring to match your needs.
Security Levels
Tor Browser provides three security levels. Access them by clicking the shield icon in the toolbar, then selecting “Change”:
- Standard – All browser features are enabled. This is the default setting and works for general browsing.
- Safer – JavaScript is disabled on non-HTTPS sites. Some fonts and math symbols are disabled. Audio and video media become click-to-play.
- Safest – JavaScript is disabled on all sites. Some images, fonts, and icons are disabled. This provides the highest level of protection but breaks many websites.
For most users, Safer provides a good balance between usability and security.
Using Bridges for Censored Networks
If you are on a network that blocks direct connections to the Tor network, you can configure bridges to bypass the restriction.
To configure bridges:
- Open Tor Browser and go to Settings (or click the hamburger menu and select Settings).
- Navigate to Connection.
- Under Bridges, select “Use a bridge”.
- Choose a built-in bridge type (obfs4 is recommended for most situations).
- Alternatively, request a bridge from the Tor Project by clicking “Request a Bridge” or enter custom bridge addresses if you have them.
- Click “OK” and restart Tor Browser.
After reconnecting, Tor Browser will route through the configured bridge, making your Tor usage harder to detect.
Verify Your Tor Connection
After launching Tor Browser, you should always verify that your traffic is actually routed through the Tor network.
Open Tor Browser and navigate to:
https://check.torproject.org
If everything is working correctly, you will see a message saying “Congratulations. This browser is configured to use Tor.” along with your current Tor exit node IP address.
If the page says you are not using Tor, double-check your connection settings and try restarting the browser.
Creating a Desktop Launcher (Tarball Method)
If you installed Tor Browser using the tarball method and the --register-app command did not create a menu entry, you can manually create a desktop launcher.
Create a .desktop file:
cat << 'EOF' | sudo tee /usr/share/applications/tor-browser.desktop
[Desktop Entry]
Type=Application
Name=Tor Browser
GenericName=Web Browser
Comment=Browse the web anonymously through the Tor network
Exec=/opt/tor-browser/start-tor-browser.desktop %u
Icon=/opt/tor-browser/browser/chrome/icons/default/default128.png
Terminal=false
StartupWMClass=Tor Browser
MimeType=text/html;text/xml;application/xhtml+xml;application/vnd.mozilla.xul+xml;text/mml;
Categories=Network;WebBrowser;Security;
StartupNotify=true
EOF
After creating the file, update the desktop database:
sudo update-desktop-database /usr/share/applications/
Tor Browser should now appear in your application menu.
Updating Tor Browser
Keeping Tor Browser up to date is critical for maintaining your security and privacy. The update process depends on your installation method.
Flatpak
Update all Flatpak applications including Tor Browser:
flatpak update
Official Tarball
Tor Browser includes a built-in updater. When a new version is available, you will see a notification in the browser. Click “Update Tor Browser” to apply the update automatically.
If the built-in updater fails, download the latest tarball from the Tor Project website and repeat the installation steps from Method 2.
torbrowser-launcher
The launcher checks for updates each time it starts. If a new version is available, it downloads and installs it automatically before launching the browser. You can also update the launcher itself through apt:
sudo apt update && sudo apt upgrade torbrowser-launcher
Safety Tips for Using Tor Browser
Tor Browser does a lot to protect your anonymity, but it cannot help if you undermine it through careless behavior. Follow these guidelines to stay safe:
- Do not install browser plugins or extensions. Tor Browser ships with a carefully configured set of protections. Adding plugins like Flash, Java applets, or even other Firefox extensions can expose your real IP address or create a unique browser fingerprint.
- Do not torrent over Tor. BitTorrent clients often send your real IP address in tracker requests, bypassing Tor entirely. Torrent traffic also puts a heavy load on the Tor network and slows it down for everyone.
- Do not maximize the browser window. Your screen resolution is one of the data points that websites use to fingerprint your browser. Tor Browser starts in a specific default window size to make all users look the same. Maximizing the window reveals your actual screen resolution.
- Do not open downloaded documents while online. Files downloaded through Tor (especially PDFs and DOC files) may contain resources that are fetched outside of Tor when opened, revealing your real IP. Disconnect from the internet before opening downloaded files, or use a virtual machine.
- Use HTTPS whenever possible. Tor encrypts traffic within the network, but the connection between the exit relay and the destination website can be unencrypted. Always prefer HTTPS sites to protect your data at the final hop.
- Do not log into personal accounts. Logging into accounts tied to your real identity (Gmail, Facebook, banking) while using Tor defeats the purpose. If you need to access personal accounts, do it outside of Tor Browser.
Troubleshooting
Tor Browser Fails to Connect
If Tor Browser hangs on “Establishing a Tor circuit” or fails to connect:
- Check that your system clock is accurate. Tor requires a reasonably correct system time to function. Sync your clock with:
sudo timedatectl set-ntp true - Make sure your firewall or network is not blocking outgoing connections on ports 80, 443, or 9001. If you are on a restrictive network, try configuring bridges as described above.
- Try using a different bridge type (meek-azure works on heavily censored networks where obfs4 does not).
Flatpak Installation Errors
If you get errors during Flatpak installation:
flatpak repair
flatpak update
Then retry the installation command.
torbrowser-launcher Fails to Download
The torbrowser-launcher package sometimes has issues with outdated signing keys or download URLs. If this happens:
sudo apt update && sudo apt install --reinstall torbrowser-launcher
You can also clear the launcher cache and try again:
rm -rf ~/.local/share/torbrowser/
torbrowser-launcher
GPG Verification Fails (Tarball Method)
If GPG verification fails with a “BAD signature” message, the downloaded file may be corrupted. Delete both the tarball and signature file, then download them again:
rm -f tor-browser-linux-x86_64-*.tar.xz*
If the signing key is not found, refresh it manually:
gpg --keyserver keyserver.ubuntu.com --recv-keys 0xEF6E286DDA85EA2A4BA7DE684E2C6E8793298290
Browser Runs Slowly
Tor traffic passes through multiple relays, so some slowdown compared to a regular browser is expected. If performance is unusually poor:
- Click the padlock icon in the address bar and select “New Circuit for this Site” to get a fresh set of relays.
- Set the security level to “Safer” or “Safest” to reduce the amount of content loaded.
- Avoid loading heavy media content through Tor.
Conclusion
You now have Tor Browser installed and configured on your Ubuntu 24.04, Linux Mint 22, or Debian 13 system. Whether you went with Flatpak for simplicity, the official tarball for full control, or the torbrowser-launcher for convenience, the end result is the same – a browser that routes your traffic through the Tor network and protects your privacy.
Remember to keep Tor Browser updated, follow the safety tips above, and always verify your connection at check.torproject.org before assuming your traffic is anonymous.






















































It worked, thanks!