1Tor protects your privacy on the internet by hiding the connection 2between your Internet address and the services you use. We believe Tor 3is reasonably secure, but please ensure you read the instructions and 4configure it properly. 5 6To build Tor from source: 7 ./configure && make && make install 8 9To build Tor from a just-cloned git repository: 10 sh autogen.sh && ./configure && make && make install 11 12Home page: 13 https://www.torproject.org/ 14 15Download new versions: 16 https://www.torproject.org/download/download.html 17 18Documentation, including links to installation and setup instructions: 19 https://www.torproject.org/docs/documentation.html 20 21Making applications work with Tor: 22 https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO 23 24Frequently Asked Questions: 25 https://www.torproject.org/docs/faq.html 26 27Release timeline: 28 https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/CoreTorReleases 29 30To get started working on Tor development: 31 See the doc/HACKING directory. 32