These guides are explainers on topics related to Tor and digital security more broadly including: Web fingerprinting, Internet censorship, Tails, metadata security, and more! You can make use of these guides for self-learning or during trainings as reading resources. For training material, please visit our training resources page

Exploring the Tor network (poster)

Exploring the Tor network (poster)

Updated: not provided
By Article19
A tabloid containing an amazing graphic about the Tor network. Part of the book How the Internet really works.
Available in: English
Exploring the Tor network (poster)

Exploring the Tor network (poster)

Updated: not provided
By Article19
A tabloid containing an amazing graphic about the Tor network. Part of the book How the Internet really works.
Available in: en
Understanding and Circumventing Network Censorship

Understanding and Circumventing Network Censorship

Updated: not provided
By Electronic Frontier Foundation (EFF)
This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.
Available in: Multiple languages
Understanding and Circumventing Network Censorship

Understanding and Circumventing Network Censorship

Updated: not provided
By Electronic Frontier Foundation (EFF)
This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.
Available in: multiple_languages
How to: Use Tor

How to: Use Tor

Updated: not provided
By Electronic Frontier Foundation (EFF)
This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.
Available in: Multiple languages
How to: Use Tor

How to: Use Tor

Updated: not provided
By Electronic Frontier Foundation (EFF)
This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.
Available in: multiple_languages
What's fingerprinting?

What's fingerprinting?

Updated: not provided
By Electronic Frontier Foundation (EFF)
Surveillance Self-Defense article explaining web browser fingerprinting and how Tor Browser protects you.
Available in: Multiple languages
What's fingerprinting?

What's fingerprinting?

Updated: not provided
By Electronic Frontier Foundation (EFF)
Surveillance Self-Defense article explaining web browser fingerprinting and how Tor Browser protects you.
Available in: multiple_languages
Evadir la censura y la vigilancia con Tor

Evadir la censura y la vigilancia con Tor

Updated: not provided
By Código Sur
Available in: Español
Evadir la censura y la vigilancia con Tor

Evadir la censura y la vigilancia con Tor

Updated: not provided
By Código Sur
Available in: es
Use Tor Browser to Become Harder to Trace

Use Tor Browser to Become Harder to Trace

Updated: not provided
By Security Planner
Available in: English
Use Tor Browser to Become Harder to Trace

Use Tor Browser to Become Harder to Trace

Updated: not provided
By Security Planner
Available in: en
Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos

Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos

Updated: not provided
By Cibermujeres
Available in: Español
Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos

Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos

Updated: not provided
By Cibermujeres
Available in: es
Cómo usar Tor Browser en tu computadora

Cómo usar Tor Browser en tu computadora

Updated: not provided
By Venezuela Inteligente
Guide explaining how to use Tor Browser and Tor bridges
Available in: Español
Cómo usar Tor Browser en tu computadora

Cómo usar Tor Browser en tu computadora

Updated: not provided
By Venezuela Inteligente
Guide explaining how to use Tor Browser and Tor bridges
Available in: es
Digital Safety kit

Digital Safety kit

Updated: not provided
By Committee to Protect Journalists (CPJ)
A tailored digital security guide made for journalists.
Available in: Español, Français, Русский, در فارسی
Digital Safety kit

Digital Safety kit

Updated: not provided
By Committee to Protect Journalists (CPJ)
A tailored digital security guide made for journalists.
Available in: es, fr, ru, fas
Cuidados Digitales: ¿Qué es el Tor Browser?

Cuidados Digitales: ¿Qué es el Tor Browser?

Updated: not provided
By SurSiendo
E-learning platform based on Moodle.
Available in: Español
Cuidados Digitales: ¿Qué es el Tor Browser?

Cuidados Digitales: ¿Qué es el Tor Browser?

Updated: not provided
By SurSiendo
E-learning platform based on Moodle.
Available in: es
An in-depth guide to choosing a web browser

An in-depth guide to choosing a web browser

Updated: not provided
By Freedom of Press Foundation
A guide comparing Tor Browser and other browser's security.
Available in: English
An in-depth guide to choosing a web browser

An in-depth guide to choosing a web browser

Updated: not provided
By Freedom of Press Foundation
A guide comparing Tor Browser and other browser's security.
Available in: en
Tor: ¿Cómo protegerte mientras navegas en Internet?

Tor: ¿Cómo protegerte mientras navegas en Internet?

Updated: not provided
By Artículo 19
A short video explaining what's Tor and how Tor works.
Available in: Español
Tor: ¿Cómo protegerte mientras navegas en Internet?

Tor: ¿Cómo protegerte mientras navegas en Internet?

Updated: not provided
By Artículo 19
A short video explaining what's Tor and how Tor works.
Available in: es
'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales

'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales

Updated: not provided
By Tormenta
A feminist fanzine discussing the Internet, anonymity, Tor, Tails.
Available in: Español
'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales

'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales

Updated: not provided
By Tormenta
A feminist fanzine discussing the Internet, anonymity, Tor, Tails.
Available in: es
Onion Browser Tutorial

Onion Browser Tutorial

Updated: not provided
By Guardian Project
This resource explains the features and how to use Onion Browser. Onion Browser is the only browser for iOS recommended by the Tor Project.
Available in: English
Onion Browser Tutorial

Onion Browser Tutorial

Updated: not provided
By Guardian Project
This resource explains the features and how to use Onion Browser. Onion Browser is the only browser for iOS recommended by the Tor Project.
Available in: en
Onion Browser Video Tutorial

Onion Browser Video Tutorial

Updated: not provided
By Guardian Project
Video tutorial with best practices to browse the web securely on iOS using Onion Browser
Available in: English
Onion Browser Video Tutorial

Onion Browser Video Tutorial

Updated: not provided
By Guardian Project
Video tutorial with best practices to browse the web securely on iOS using Onion Browser
Available in: en
Getting your hands started with Tails

Getting your hands started with Tails

Updated: not provided
By geb
Step by step tutorial used to introduce Tails to journalism students. Actually used in journalism schools in France. Topics: Tor, persistence, metadata, secure removal, Veracrypt, OnionShare etc. On request ; please click to contact author.
Available in: English
Getting your hands started with Tails

Getting your hands started with Tails

Updated: not provided
By geb
Step by step tutorial used to introduce Tails to journalism students. Actually used in journalism schools in France. Topics: Tor, persistence, metadata, secure removal, Veracrypt, OnionShare etc. On request ; please click to contact author.
Available in: en
Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements

Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements

Updated: not provided
By Glencora Borradaile
An introduction book to cryptography, Tor, and surveillance used against social movements in US.
Available in: English
Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements

Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements

Updated: not provided
By Glencora Borradaile
An introduction book to cryptography, Tor, and surveillance used against social movements in US.
Available in: en
Leak and Onion Soup

Leak and Onion Soup

Updated: not provided
By Exposing the invisible (Tactical Tech)
A guide about using Tor to read, verify and process leaked data, which might come with a risk.
Available in: English
Leak and Onion Soup

Leak and Onion Soup

Updated: not provided
By Exposing the invisible (Tactical Tech)
A guide about using Tor to read, verify and process leaked data, which might come with a risk.
Available in: en

Community building

Do you know of or have any Tor training materials (slides, guides, fanzines, videos, and other formats) that should be part of this training section? Please send an email to training at torproject.org with:

  • Title and description
  • Author and author contact information
  • Link to download or access the resource
  • Resource license (Creative Commons or similar license)

Please note that we will evaluate if: