Explains what Tor is, how to use it correctly, and what mistakes destroy anonymity.

 Includes installation, verification, usage guidelines, and fingerprinting pitfalls.