{"id":295,"date":"2010-04-12T15:41:00","date_gmt":"2010-04-12T14:41:00","guid":{"rendered":"http:\/\/www.celesteh.com\/blog\/2010\/04\/12\/how-to-run-tor-short-version\/"},"modified":"2015-06-19T00:23:44","modified_gmt":"2015-06-18T23:23:44","slug":"how-to-run-tor-short-version","status":"publish","type":"post","link":"https:\/\/www.celesteh.com\/blog\/2010\/04\/12\/how-to-run-tor-short-version\/","title":{"rendered":"How to run Tor &#8211; the short version"},"content":{"rendered":"<h3>Windows Users<\/h3>\n<ol>\n<li><a href=\"http:\/\/www.torproject.org\/easy-download.html.en\">Download Tor<\/a>\n<li><a href=\"http:\/\/www.torproject.org\/docs\/tor-doc-windows.html.en\">Install it<\/a>\n<li><a href=\"http:\/\/www.torproject.org\/torbutton\/index.html.en\">Install Torbutton<\/a>\n<li><a href=\"http:\/\/www.torproject.org\/docs\/tor-doc-relay.html.en\">Configure it to be a relay<\/a>\n<\/ol>\n<h3>Mac Users<\/h3>\n<ol>\n<li><a href=\"http:\/\/www.torproject.org\/easy-download.html.en\">Download Tor<\/a>\n<li><a href=\"http:\/\/www.torproject.org\/docs\/tor-doc-osx.html.en\">Install it<\/a>\n<li><a href=\"http:\/\/www.torproject.org\/torbutton\/index.html.en\">Install Torbutton<\/a>\n<li><a href=\"http:\/\/www.torproject.org\/docs\/tor-doc-relay.html.en\">Configure it to be a relay<\/a>\n<\/ol>\n<h2>Why<\/h2>\n<ul>\n<li>It protects you from your ISP or government spying on your data.\n<li>It allows other people to get around national firewalls, like the one in China or the one the UK is about to build\n<li>It promotes free speech and access to information in oppressed areas\n<\/ul>\n<p><a href=\"http:\/\/www.celesteh.com\/blog\/2010\/04\/09\/digital-economy-bill-and-tor\/\">Read more . . .<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Windows Users Download Tor Install it Install Torbutton Configure it to be a relay Mac Users Download Tor Install it Install Torbutton Configure it to be a relay Why It protects you from your ISP or government spying on your data. It allows other people to get around national firewalls, like the one in China &hellip; <a href=\"https:\/\/www.celesteh.com\/blog\/2010\/04\/12\/how-to-run-tor-short-version\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">How to run Tor &#8211; the short version<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[1],"tags":[76,154,48],"class_list":["post-295","post","type-post","status-publish","format-standard","hentry","category-uncategorised","tag-celesteh","tag-crypto","tag-howto"],"_links":{"self":[{"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/posts\/295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":2,"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":4426,"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/posts\/295\/revisions\/4426"}],"wp:attachment":[{"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.celesteh.com\/blog\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}