
Those pages may look intimidating, but we will be skipping the part that says "Configure your applications to use Tor." If you are following this for Windows, make sure to download and install Privoxy. Keep your browser on that page and click the Tor installation instructions for either Windows or Mac OS X. Now what? Point your browser over to the Tor download page and get the latest version of Tor for your OS. Also, if you're feeling adventurous you can setup Tor for many online-enabled programs. The Tor network is still in its infancy so it is important to understand that we will not be routing peer-to-peer traffic through it, merely client and tracker configuration data. This makes it impossible for anyone to find out any more information about your packets than where they are traveling to at a specific point and since Tor makes sure your data travels in random paths, you are safe. That being said, anonymity is not the fastest thing so don't expect to be getting 600kb/s down. Your data randomly hops from proxy to proxy until it reaches its destination. You can think of Tor as a large network of proxies. With Tor, your data takes a random route using Onion routers, a distributed network of servers, rather than a direct source to destination path.

There is another approach to anonymous Azureus using the I2P network and you may attempt that by yourself. Tor is the tool we are going to use to provide a layer of anonymity to Azureus. Warning: This one's a bit more difficult. This article is part of a series, please check out the first and second articles if you have not done so already. I will essentially be translating this article into something that you can follow.

My goal for this article is to have your Azureus installation running on the Tor anonymizing overlay network for TCP. There has recently been a lot of buzz about decentralized trackers for BitTorrent and other tools resulting in anonymous filesharing.

Note: Please consider setting up a Tor server to donate bandwidth to the network.
