These guides are explainers on topics related to Tor and digital security more broadly including: Web fingerprinting, Internet censorship, Tails, metadata security, and more! You can make use of these guides for self-learning or during trainings as reading resources. For training material, please visit our training resources page
Exploring the Tor network (poster)
Updated: not provided
By Article19
A tabloid containing an amazing graphic about the Tor network. Part of the book How the Internet really works.
Available in: English
Exploring the Tor network (poster)
Updated: not provided
By Article19
A tabloid containing an amazing graphic about the Tor network. Part of the book How the Internet really works.
Available in: en
Understanding and Circumventing Network Censorship
Updated: not provided
By Electronic Frontier Foundation (EFF)
This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.
Available in: Multiple languages
Understanding and Circumventing Network Censorship
Updated: not provided
By Electronic Frontier Foundation (EFF)
This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.
Available in: multiple_languages
By Electronic Frontier Foundation (EFF)
This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.
Available in: Multiple languages
By Electronic Frontier Foundation (EFF)
This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.
Available in: multiple_languages
By Electronic Frontier Foundation (EFF)
Surveillance Self-Defense article explaining web browser fingerprinting and how Tor Browser protects you.
Available in: Multiple languages
By Electronic Frontier Foundation (EFF)
Surveillance Self-Defense article explaining web browser fingerprinting and how Tor Browser protects you.
Available in: multiple_languages
Evadir la censura y la vigilancia con Tor
Updated: not provided
By Código Sur
Available in: Español
Evadir la censura y la vigilancia con Tor
Updated: not provided
By Código Sur
Available in: es
Use Tor Browser to Become Harder to Trace
Updated: not provided
By Security Planner
Available in: English
Use Tor Browser to Become Harder to Trace
Updated: not provided
By Security Planner
Available in: en
Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos
Updated: not provided
By Cibermujeres
Available in: Español
Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos
Updated: not provided
By Cibermujeres
Available in: es
Cómo usar Tor Browser en tu computadora
Updated: not provided
By Venezuela Inteligente
Guide explaining how to use Tor Browser and Tor bridges
Available in: Español
Cómo usar Tor Browser en tu computadora
Updated: not provided
By Venezuela Inteligente
Guide explaining how to use Tor Browser and Tor bridges
Available in: es
By Committee to Protect Journalists (CPJ)
A tailored digital security guide made for journalists.
Available in: Español, Français, Русский, در فارسی
By Committee to Protect Journalists (CPJ)
A tailored digital security guide made for journalists.
Available in: es, fr, ru, fas
Cuidados Digitales: ¿Qué es el Tor Browser?
Updated: not provided
By SurSiendo
E-learning platform based on Moodle.
Available in: Español
Cuidados Digitales: ¿Qué es el Tor Browser?
Updated: not provided
By SurSiendo
E-learning platform based on Moodle.
Available in: es
An in-depth guide to choosing a web browser
Updated: not provided
By Freedom of Press Foundation
A guide comparing Tor Browser and other browser's security.
Available in: English
An in-depth guide to choosing a web browser
Updated: not provided
By Freedom of Press Foundation
A guide comparing Tor Browser and other browser's security.
Available in: en
Tor: ¿Cómo protegerte mientras navegas en Internet?
Updated: not provided
By Artículo 19
A short video explaining what's Tor and how Tor works.
Available in: Español
Tor: ¿Cómo protegerte mientras navegas en Internet?
Updated: not provided
By Artículo 19
A short video explaining what's Tor and how Tor works.
Available in: es
'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales
Updated: not provided
By Tormenta
A feminist fanzine discussing the Internet, anonymity, Tor, Tails.
Available in: Español
'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales
Updated: not provided
By Tormenta
A feminist fanzine discussing the Internet, anonymity, Tor, Tails.
Available in: es
By Guardian Project
This resource explains the features and how to use Onion Browser. Onion Browser is the only browser for iOS recommended by the Tor Project.
Available in: English
By Guardian Project
This resource explains the features and how to use Onion Browser. Onion Browser is the only browser for iOS recommended by the Tor Project.
Available in: en
Onion Browser Video Tutorial
Updated: not provided
By Guardian Project
Video tutorial with best practices to browse the web securely on iOS using Onion Browser
Available in: English
Onion Browser Video Tutorial
Updated: not provided
By Guardian Project
Video tutorial with best practices to browse the web securely on iOS using Onion Browser
Available in: en
Getting your hands started with Tails
Updated: not provided
By geb
Step by step tutorial used to introduce Tails to journalism students. Actually used in journalism schools in France. Topics: Tor, persistence, metadata, secure removal, Veracrypt, OnionShare etc. On request ; please click to contact author.
Available in: English
Getting your hands started with Tails
Updated: not provided
By geb
Step by step tutorial used to introduce Tails to journalism students. Actually used in journalism schools in France. Topics: Tor, persistence, metadata, secure removal, Veracrypt, OnionShare etc. On request ; please click to contact author.
Available in: en
Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements
Updated: not provided
By Glencora Borradaile
An introduction book to cryptography, Tor, and surveillance used against social movements in US.
Available in: English
Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements
Updated: not provided
By Glencora Borradaile
An introduction book to cryptography, Tor, and surveillance used against social movements in US.
Available in: en
By Exposing the invisible (Tactical Tech)
A guide about using Tor to read, verify and process leaked data, which might come with a risk.
Available in: English
By Exposing the invisible (Tactical Tech)
A guide about using Tor to read, verify and process leaked data, which might come with a risk.
Available in: en
Community building
Do you know of or have any Tor training materials (slides, guides, fanzines, videos, and other formats) that should be part of this training section?
Please send an email to training at torproject.org with:
- Title and description
- Author and author contact information
- Link to download or access the resource
- Resource license (Creative Commons or similar license)
Please note that we will evaluate if: