If you’re still unable to connect then there is a good chance your ISP is blocking you.
This is not uncommon, especially on public and business networks.
All the traffic that now comes into and out of your computer is routed through the Tor network.
To almost all prying eyes, your activity is now encrypted and hidden.
Tor can be used to go around internet controls, maintain private correspondence, and access private online markets.
Often touted as software for hackers and criminals, Tor Browser is in reality, a powerful tool for anyone looking to increase personal online privacy.
The organization is constantly releasing new versions and updating to fix bugs and user issues.In most cases, the automatic setup will work on its own.A few Internet service providers (ISPs) and public networks have security in place to prevent users from reaching the Tor servers.[Read: Configure dynamic DNS client (ddclient) to update Dyn DNS and Zoneedit simultaneously] If your primary goal is privacy then spend a few dollars on a cheap USB stick.The small file (only 165 MB) fits easily onto most types of portable storage and when using a work or shard computer, there is no data left on local disks about Tor’s presence.The Tor button, to the left of the address bar, also allows for the quick adjustment of what plugins and applications Tor will allow to run without your expressed permission.