What is Tor?
In this tutorial, we’ll show you how to install Tor on Kali Linux.
First, what is Tor? Tor (The Onion Router) is a free, open-source tool for private browsing. It encrypts your internet traffic and routes it through a worldwide network of volunteer-run servers.
Unlike regular browsers, Tor offers strong privacy protections. For example:
- Tor hides your real IP address.
- It blocks tracking and surveillance.
- It helps bypass censorship.
But Tor isn’t just a browser—it’s a secure privacy network. By scrambling your data in layers (like an onion), it prevents others from spying on your online activity.
Here’s why Tor matters:
- Makes you anonymous. Masks your IP address, making your online activity untraceable.
- It encrypts data in layers (like an onion) to prevent snooping
- You can access blocked websites in restrictive regions.
Why does anonymity matter?
In today’s digital world, you’re constantly watched – by governments, corporations, and censors. Anonymity does more than protect your privacy; it defends your freedom. Tor Browser gives you that freedom by making your online movements completely untraceable.
Tor (The Onion Router) protects your internet traffic in three powerful ways. First, it encrypts your data multiple times. Then, it routes this encrypted traffic through a global network of volunteer-run servers. Finally, this multi-layered system guarantees that:
- Your internet provider, hackers, and even governments can’t track which websites you visit
- Websites you use cannot detect your real IP address or physical location.
- Advertisers, corporations, and cybercriminals are blocked from tracking and analyzing your browsing habits.
Install TOR on Kali or Linux
In this guide, you’ll learn different methods to install Tor on Kali Linux:
- Installing Tor Browser via Official Website (GUI)
- Installing Tor Using apt (Terminal Method)
- Installation from Debian Package Repository
Let’s get started!
Installing Tor Browser via Official Website
Go to official website and click Download
Click on “Download for Linux”
It will download the file which we can extract using below command
tar -xf <file-name-here> |
Mark the file as executable and then register it using below commands
chmod +x start-tor-browser.desktop |
After registering the app, you can start using the tor browser.
Installing Tor Browser via Package Manager
One more way of installing it is via apt-get package manager using below command
sudo apt-get install tor |
To verify.
Installing Tor from Debian Package Repository
Before setting up Tor on your system, it’s crucial to verify your computer’s processor architecture. This quick check ensures you download the right version that will work with your hardware.
The official Tor Project provides pre-built packages for three common architectures:
- amd64 (standard 64-bit processors used in most modern Windows/Linux computers)
- arm64 (64-bit ARM chips found in newer Raspberry Pi devices and Apple Silicon Macs)
- i386 (legacy 32-bit x86 processors for older machines)
Why does this matter? Installing the wrong version could lead to:
- Performance issues or crashes
- Security vulnerabilities
- Complete failure to run
Most modern systems use amd64, but it’s always worth double-checking to avoid installation headaches later. If you’re unsure which architecture you have, we’ll show you how to check it in the next section.
To check your system’s architecture, run the command
When you check your system’s architecture, it will display one of these supported types
- amd64
- arm64
- i386
If your architecture is not among the supported ones, you can explore alternative installation methods. For example, compiling from source or using a different privacy solution. Always ensure your system matches one of the supported architectures before attempting to install packages. This is done to avoid compatibility issues.
Install apt-transport-https
This package allows APT-based package managers to securely access repositories over HTTPS. It provides encrypted connections and verifies package authenticity when downloading software updates.
Now create a new file in /etc/apt/sources.list.d/ named tor.list. Add the following entries
deb [signed-by=/usr/share/keyrings/deb.torproject.org-keyring.gpg] https://deb.torproject.org/torproject.org <DISTRIBUTION> main |
Replace <DISTRIBUTION> with your Operating System codename. Run below command to check the operating system version.
Add the gpg key
Then add the gpg key used to sign the packages by running the following command at your command prompt:
wget -qO- https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | gpg --dearmor | tee /usr/share/keyrings/deb.torproject.org-keyring.gpg >/dev/null |
Install tor and tor debian keyring
Install it with the following commands:
# sudo apt update |
Known Error Message
In some cases where people try to run Tor Browser on their machines, people face below error
Tor Browser requires a CPU with SSE2 support. Exiting. |
This means that your processor does not support SSE2 (Streaming SIMD Extensions 2), which is a set of CPU instructions required to run modern software like the Tor Browser. Unfortunately, there does not exist a proper solution for this error. For more information on this, you can read below thread
Conclusion
This article gave information on how to install tor on kali linux tutorial. Tor is an essential tool for protecting online privacy, enabling anonymous browsing, and bypassing censorship through its multi-layered encryption and decentralized relay network. In this guide, we covered multiple methods to install Tor on Kali Linux, downloading from the official website, using apt, and configuring the Debian repository for secure updates. However, users must ensure their system meets requirements, such as SSE2 CPU support, to avoid compatibility issues. While Tor enhances security, proper usage like avoiding personal logins and enabling HTTPS is crucial to maintaining anonymity. Whether for privacy, research, or accessing restricted content, Tor remains a powerful solution in an era of increasing surveillance.
To read more about cybersecurity tutorials, visit us at hackingloops.com
Stay safe, stay anonymous!