Although Tor has state-of-the art anticensorship measures, users in heavily censored environments will not be able to connect to Tor if they cannot configure their connections. We perform the first usability evaluation of Tor Launcher, the graphical user interface (GUI) that Tor Browser uses to configure connections to Tor. Our study shows that 79% (363 of 458) of user attempts to connect to Tor in simulated censored environments failed. We found that users were often frustrated during the process and tried options at random. In this paper, we measure potential usability issues, discuss design constraints unique to Tor, and provide recommendations based on what we learned to help more users connect to Tor while reducing the time they take to do so. Tor Browser incorporated the changes proposed by this study.
 A. Adams and M. A. Sasse. Users are not the enemy. Communications of the ACM, 42(12):40–46, 1999.
 D. Akhawe and A. P. Felt. Alice in warningland: A large-scale field study of browser security warning effectiveness. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), pages 257–272, 2013.
 W. Albert and T. Tullis. Measuring the user experience: collecting, analyzing, and presenting usability metrics. Newnes, 2013.
 J. Clark, P. C. Van Oorschot, and C. Adams. Usability of anonymous web browsing: An examination of Tor interfaces and deployability. In 3rd Symposium on Usable Privacy and Security, pages 41–51. ACM, 2007.
 R. Dhamija and A. Perrig. Déjà Vu: A user study using images for authentication. In USENIX Security Symposium, volume 9, pages 4–4, 2000.
 R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In SIGCHI conference on Human Factors in computing systems, pages 581–590. ACM, 2006.
 R. Dingledine and N. Mathewson. Anonymity loves company: Usability and the network effect. In R. Anderson, editor, Fifth Workshop on the Economics of Information Security, June 2006.
 R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In 13th USENIX Security Symposium, August 2004.
 K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton. Protocol misidentification made easy with Format-Transforming Encryption. In Computer and Communications Security. ACM, 2013.
 S. Egelman, L. F. Cranor, and J. Hong. You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In SIGCHI Conference on Human Factors in Computing Systems, pages 1065–1074. ACM, 2008.
 S. Egelman, D. Molnar, N. Christin, A. Acquisti, C. Herley, and S. Krishnamurthi. Please continue to hold. In Ninth Workshop on the Economics of Information Security, 2010.
 B. Fabian, F. Goertz, S. Kunz, S. Müller, and M. Nitzsche. Privately waiting: A usability analysis of the Tor anonymity network. In Sustainable e-Business Management, Lecture Notes in Business Information Processing 58, pages 63–75. Springer, 1 edition, 2010.
 D. Fifield, N. Hardison, J. Ellithorpe, E. Stark, D. Boneh, R. Dingledine, and P. Porras. Evading censorship with browser-based proxies. In Privacy Enhancing Technologies, pages 239–258, Berlin, Heidelberg, 2012. Springer-Verlag.
 D. Fifield, C. Lan, R. Hynes, P. Wegmann, and V. Paxson. Blocking-resistant communication through domain fronting. Privacy Enhancing Technologies, 1(2):1–19, 2015.
 S. L. Garfinkel and R. C. Miller. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. In 2005 symposium on Usable privacy and security, pages 13–24. ACM, 2005.
 N. S. Good, J. Grossklags, D. K. Mulligan, and J. A. Konstan. Noticing notice: a large-scale experiment on the timing of software license agreements. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 607–616. ACM, 2007.
 K. Krol, J. M. Spring, S. Parkin, and M. A. Sasse. Towards robust experimental design for user studies in security and privacy. In Learning from Authoritative Security Experiment Results (LASER), pages 21–31, San Jose, CA, 2016. USENIX.
 G. Norcie, K. Caine, and L. J. Camp. Eliminating stoppoints in the installation and use of anonymity systems: A usability evaluation of the Tor Browser Bundle. In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2012.
 B. D. Payne and W. K. Edwards. A brief introduction to usable security. IEEE Internet Computing, 12(3):13–21, 2008.