Tor firefox already running mac

I mean, how are we gonna make this work?

How to: Use Tor on macOS

Privacy and security are both like a chain. The strength of the chain is only as strong as its weakest link. So in order for something like Tor to be useful, you need to use it for anything and everything, if possible. Moreover, the more people who use it, the more useful it becomes for everyone using it since fewer and fewer uses of Tor will, themselves, arouse suspicion. Private browsing should be the default , not the exception. But in order for something like Tor to actually get used , it needs to be unobtrusive, easy to use, and easy to stop using. When version 3. The bad news is that advanced configuration of your connection to the Tor network on Mac OS X is harder.

Thanks, Tor developers! The Tor Browser Bundle is a package deal. It gives you the Tor software itself , plus a graphical tool called Vidalia used to manage and configure your connection to the Tor network , as well as a completely clean browser based on Mozilla Firefox with some privacy-enhancing add-ons already pre-installed.

Your browser is configured to use Tor. However, only the TorBrowser application is using Tor. You are not using Tor. Since Tor is a network proxy, it works by accepting connections, forwarding them on behalf of the initiator, and then passing back any responses it receives. This means you need to tell your operating system to send connection requests it wants to make to Tor instead of out onto the network itself. But in order to do that , you need to know where Tor will be listening for connection requests.

It was recently changed to use port by default. But since this guide was written before that change, its instructions refer to port All this means is that wherever you see me refer to port or similar, replace it with instead. Thanks, milo! By default, the Tor Browser Bundle is configured to look for an unused network port on your system and use that. The Tor FAQ provides instructions for doing this :.

Your Socks port will then be on At this point, you should have a running Tor instance listening on its default port for incoming connection requests. All you need to do now is tell your operating system to send all its network requests to that location. At this point, any time an app on your system tries to access the network, the connection will be routed through Tor. All the built-in applications, like Mail. On my computer, the Network Location for Tor is the default, and I almost never change it away from that. I also set up the TorBrowser to open when I log in to my computer.

This means I now tunnel all my traffic through Tor by default. But all or nothing is a rather blunt approach. We can do this in one of two ways. If you know you never want to use Tor for specific domains or websites, you can enter them in a comma-separated list back where you set up the SOCKS proxy. For instance, if you never want to use Tor to get to Wikipedia, enter , wikipedia. You can also use this method to bypass Tor for multi-media sites like YouTube or Pandora Internet Radio, which are often frustratingly slow when proxied.

Anyway, this configuration will always bypass Tor for accessing any Wikipedia. You can also make multiple Proxy Profiles that each use a different port number you configured in Step 2. With this Proxy Rule configuration, which is very reminiscent of email rules , all of my Web browsing with the exception of editing Wikipedia articles will automatically be routed through Tor. I can now add additional bypass rules for browsing, say, Pandora. Still, sometimes Tor will dump me on the Internet from Romania or some country where Pandora blocks access. For those of you who think the belt-and-suspenders approach is just too groovy to ignore, here are some additional things you could do to protect your privacy.

Front Page Stories

However, third-party cookies are arguably only useful for tracking purposes. I recommend installing at least the following browser add-ons:. The only trustworthy ad blocking add-on also happens to be both the best and simplest one: uBlock Origin , and it is available for both Mozilla Firefox and Google Chrome. Each of those tools are made by companies that actually track you. In fact, it even comes bundled with the TorBrowser! Install it, use it, love it! In addition to outright tracking, monitoring, and other direct surveillance techniques, your identity and activities can be determined by inference after collating and analyzing a bunch of data about you.

Google claims to offer private search and the ability to erase your Google search history , but why give it to them in the first place? Consider doing the same! This information is known as a Referer [sic. On Google Chrome you can use Referer Control for a simple solution, or ScriptSafe for a more robust one, which by default masks your Referer header as well as disabling JavaScript another best practice, but outside the scope of this article.

Your hair color, eye color, height, weight, and a vast array of other biometrics can be used to identify you. What you need to be aware of is that so does your Web browser. Everything from the make and model of your browser to your screen size to the fonts you have installed on your system can be used to pick you out of a crowd of Web browsers.

Use NoScript , and tools like it. Anyone can scan the network looking for them. Remember telemarketers? I hate telemarketing. The previous advice about blocking trackers and web bugs is what will actually keep your browser tracker-free, regardless of how DNT evolves. Unfortunately, simply by its nature as a voluntary self-regulation, almost no tracking companies obey this signal, making it worse than useless. When that feature becomes generally available slated for release in Firefox version 39 , I suggest you turn it on. Advanced users can already turn it on by typing about:config in their Firefox address bar, searching for trackingprotection and ensuring the privacy.

If you got all the way here, gain 10, experience points, and level up!! You are now a fledgling technomage. In the age of online social networks, protecting your privacy is a network problem. That means your friends need to be in on it, too! Using that, you can download the Tor software without a graphical interface, which you can then use in much the same way as described above except without a point-and-click interface. Doing it this way means you install less actual software, saving some disk space, and you may tax your computer less.

Like I told Jacob Appelbaum when he suggested the same thing , Montauk, I wanted someone who followed this howto to have a functional Tor in the very first step, yet still be able to configure and use their installation like an expert. And yes, under this definition, most technology sucks. Because most technology sucks. Granted, surfing with the TBB is much safer for the average user etc. Just a quick note, configuring your mac to route all your connections through the proxy is not a bulletproof solution, all applications in the operating system have to manually opt-in to obey that.

Yup, it seems the Tor Browser Bundle changed the settings with which it ships. Thanks so much for noting this in your comment, milo. Then re-open Vidalia and your settings should be active.

Mozilla and Tor Warn of Critical Firefox Vulnerability, Urge Users to Update - MacRumors

Have you ever seen this before? Sorry, Tonei, that sounds like a problem with your system software, not with Tor. Worse, because tor shares circuits across multiple application streams, all it takes is for a single one of these applications to provide identifying information and the exit node will be able to associate all other streams going over that circuit with your identity. Setup instructions differ per client, but they generally are similar to the client configuration routine TorrentSecurity. If you download the current version of TBB and then install it into a new folder, does it start correctly?

I tried opening TBB in several ways. This error shows up when started from the dmg directly, independent from if Firefox or TBB is running or not. So I suspect it is an error that shows up when TBB is started from a drive where it can't write. I propose a different error message quick sketch attached. I tried to use wording for non tech savvy users. If that fails not enough permissions we try in the users' Applications folder. All this without letting the system prompt for the password which the non-administrator user possibly does not have.

Better copy it into the users own applications folder directly.

  • editeur de video gratuit pour mac.
  • tor browser bundle - Opening Tor on my Mac OX says Firefox is already running - Tor Stack Exchange!
  • How to Fix the “Firefox Is Already Running” Error.
  • Simple Tor setup on macOS.
  • HowTo: Use Tor for all network traffic by default on Mac OS X.
  • Mozilla bug throws Tor Browser users into chaos.

It would be great if we could after the copy, open TBB from the new location. Even better but I guess that is not possible easily? You could copy Tor Browser to your hard drive. With buttons 'Copy now' brings up a File save dialog, opened at the Applications folder - select a folder and hit Copy: if password needed the system prompts as usual and a button 'I do it later' effectively Cancel.

  • tasty kitchen crock pot mac and cheese!
  • What to do?.
  • Mozilla and Tor Warn of Critical Firefox Vulnerability, Urge Users to Update?
  • b&n nook app for mac.
  • # (Firefox is already running.) – Tor Bug Tracker & Wiki;

In this mode no auto-opening and not auto-ejecting the dmg. I think this is a dup of Powered by Trac 1.

Wait a Few Seconds

View Tickets Wiki Tags. Opened 5 years ago Closed 4 years ago.