Tor Browser Bundle for Mac enables you to securely browse the Web while hiding your identity, proving to be an accessible, feature-rich option. Because of its dependency on the Tor network, however, it may feel sluggish at times.
Quick and easy install: Using Tor Browser Bundle for Mac turns out to be easier than running the separate client version. You just have to download an archive, extract the file, launch it, and that's it.
Tried and tested Tor network: This browser uses the Tor network, which, although not the fastest anonymity solution available, does work well. This app is still being developed further, but even in its current form feels reliable.
Control panel: Every essential feature can be quickly accessed through the Vidalia Control Panel, which enables you to stop Tor, configure relaying, view the network, use a new identity, and exit the application. You can also generate a bandwidth graph and see message logs.
Performance depends on the Tor network: This anonymity solution suffers from the slowness of the Tor network.
Configurations lost during updates: Don't expect to have your settings preserved after updating to a newer version. This can be frustrating, especially if you've spent a lot of time tweaking your settings.
Free and dependable, Tor Browser Bundle for Mac can be a good option if you are searching for an application that can increase your Web browsing privacy. It's already the browser bundle, so you should no longer encounter problems with the installation process, as was the case with previous releases.
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens. See the Who Uses Tor? page for examples of typical Tor users. See the overview page for a more detailed explanation of what Tor does, and why this diversity of users is important. Tor doesn't magically encrypt all of your Internet activities, though. You should understand what Tor does and does not do for you. Tor's security improves as its user base grows and as more people volunteer to run relays. (It isn't nearly as hard to set up as you might think, and can significantly enhance your own security.) If running a relay isn't for you, we need help with many other aspects of the project, and we need funds to continue making the Tor network faster and easier to use while maintaining good security.