1Tor protects your privacy on the internet by hiding the connection
2between your Internet address and the services you use. We believe Tor
3is reasonably secure, but please ensure you read the instructions and
4configure it properly.
5
6To build Tor from source:
7        ./configure && make && make install
8
9To build Tor from a just-cloned git repository:
10        sh autogen.sh && ./configure && make && make install
11
12Home page:
13        https://www.torproject.org/
14
15Download new versions:
16        https://www.torproject.org/download/download.html
17
18Documentation, including links to installation and setup instructions:
19        https://www.torproject.org/docs/documentation.html
20
21Making applications work with Tor:
22        https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO
23
24Frequently Asked Questions:
25        https://www.torproject.org/docs/faq.html
26
27Release timeline:
28        https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/CoreTorReleases
29
30To get started working on Tor development:
31        See the doc/HACKING directory.
32