I didn't think Unz posts *all* his articles. Either way, site is always up on TOR, but currently it's down for some people on the normieweb and should be fixed in a few days. When normieweb is down, I just boot up a livelinux thumbdrive (Tails or Kodachi) and they have a couple of built in TOR browsers. Takes a couple of minutes to boot up, but it's a live linux operating system running just in your RAM, you don't need to even know anything about linux, other than how to connect to wifi and how to open the browser, and there is no trace of it after you reboot your machine. Reboot back into Windows or Mac and you're back as if you never visited.
I am also hesitant at running some special Windows browser that runs on the TOR network--first I don't trust the OS to not accidentally or intentionally leak data, and second I just don't trust the other junk they might put in there to fund their "free" software. Linux is written with the donated time of volunteer computer nerds.
There is a thread here to discuss internet privacy.
With the growth of the "Medical Gulag," there's been an uptick of discussion on the RVF about OpSec, also known as Operational Security. From Wikipedia: Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by enemy...
www.rooshvforum.com
Purpose of Linux Kodachi is to provide a secure, anti forensic, and anonymous operating system
www.digi77.com
There is some misinformation in this thread--no one is claiming the TOR protocol is unsafe; merely that a certain windows browser is not a recommended way of accessing it. It's completely safe to run TOR under the options above. It is slightly slower than the normieweb, but that's not an issue for websites, only downloading files and attachments. It's like using a VPN--I turn it on when I need it (ahem piratebay)-- but always using it is not advisable.
You should get used to doing this, because more and more people are going to get censored, and you need to be familiar with methods of bypassing their attacks. Download the OS to a thumbdrive, boot it up, try it out, then stick it in a drawer until you need it. I can't do crypto but I can do this. Very easy.