Colors
The main Tor Project color is Purple. Use Dark Purple as a secondary option.
#7D4698
Purple
#59316B
Dark Purple
#68B030
Green
#F8F9FA
Grey
#333A41
Dark Grey
#FFFFFF
White
Apps
Our apps' interface use safe and bright colors.
blueviolet
Blue Violet
darkblue
Dark Blue
blue
Blue
lime
Lime
Grid
Our main used grid compositions are outlined here. Use them to generate one column or various columns layouts.
12
4
8
3
9
2
2
2
2
2
2
3
3
3
3
4
4
4
6
6
8
6
Typography
Our main typography is Source Pro made by Paul D. Hunt as Adobe’s first open source typeface family, conceived primarily as a typeface for user interfaces.
H1
Privacy is a right, not a privilege
H2
Privacy is a right, not a privilege.
H3
Privacy is a right, not a privilege
H4
Privacy is a right, not a privilege
H5
Privacy is a right, not a privilege
H6
Privacy is a right, not a privilege
H1 display
Why Anonymity Matters
H2 display
Why Anonymity Matters
H3 display
Why Anonymity Matters
H4 display
Why Anonymity Matters
Paragraph
SANS
Privacy experts warn that law enforcement, intelligence services, and malicious hackers run their own exit nodes for exactly that surveillance purpose. It's critical, then, for Tor users to only visit HTTPS-protected websites to ensure that the information that passes between the browser and the site remains encrypted.
SERIF
The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy.
ARABIC
شبكة تور هي مجموعة من الخوادم التي يديرها المتطوعون والتي تسمح للناس بتحسين خصوصيتهم وأمنهم على الإنترنت. يستخدم مستخدمو تور هذه الشبكة من خلال الاتصال من خلال سلسلة من الأنفاق الافتراضية بدلا من إجراء اتصال مباشر، مما يسمح للمنظمات والأفراد على حد سواء لتبادل المعلومات عبر الشبكات العامة دون المساس بخصوصيتهم. وعلى نفس المنوال، يعتبر تور أداة فعالة للرقابة على الرقابة، مما يسمح للمستخدمين بالوصول إلى وجهات أو محتويات محجوبة. يمكن أيضا استخدام تور كبنة بناء لمطوري البرمجيات لإنشاء أدوات اتصال جديدة مع ميزات خصوصية مضمنة.
Icons
Download the Tor icons set from here (.zip)
authority
badexit
bridge
country
directory
exit
fallbackdir
fast
fingerprint
guard
hibernating
hsdir
ipv4
ipv6
ipv6exit
noedconsensus
notrecommended
onion
onion-alt
reachableipv4
reachableipv6
relay
running
stable
tshirt
unmeasured
unreachableipv4
unreachableipv6
v2dir
valid
Illustrations
Tor Browser Onboarding