What is Tor Network?
A free, open-source software and network that enables anonymous communication by directing Internet traffic through a worldwide volunteer overlay network of thousands of relays. Tor conceals users' locations and usage from surveillance and traffic analysis.
Also known as: Tor, The Onion Router
Tor (The Onion Router) is the gold standard for anonymous internet browsing. It routes your traffic through multiple volunteer-operated servers worldwide, making it extremely difficult to trace your online activity back to you.
How Tor Works
- Entry Node: Your traffic enters the Tor network (knows your IP, but not destination)
- Middle Relay(s): Traffic passes through intermediate nodes (knows neither source nor destination)
- Exit Node: Traffic exits to the internet (knows destination, but not your IP)
Each layer is encrypted like the layers of an onion, hence "onion routing."
Use Cases
- Journalists: Protecting sources and researching sensitive topics
- Activists: Organizing in repressive regimes
- Privacy-conscious users: Avoiding surveillance and tracking
- Researchers: Studying censorship and surveillance
Limitations
- Slower speeds: Multiple hops add latency
- Exit node vulnerability: Unencrypted traffic can be seen by exit nodes
- Not for torrenting: Puts strain on the network and may leak IP
- Fingerprinting: Browser fingerprinting can still identify you
Best Practices
- Always use the official Tor Browser (not just the network)
- Don't maximize the browser window (aids fingerprinting)
- Don't install additional plugins
- Use HTTPS sites when possible
- Don't log into personal accounts that could identify you
Related Terms
IP Address
A unique numerical identifier assigned to every device connected to a computer network. Your IP address reveals your approximate geographic location and can be used to track your online activity, link your actions across websites, and identify your internet service provider.
Onion Routing
A technique for anonymous communication over a computer network where messages are encapsulated in layers of encryption, analogous to layers of an onion. Each relay decrypts one layer to reveal the next destination, but no single relay knows both the origin and final destination.
Virtual Private Network
A technology that creates a secure, encrypted connection over a less secure network, such as the public internet. VPNs mask your IP address, encrypt your internet traffic, and can make it appear as though you're browsing from a different location.
Related Tools
Have more questions?
Use our guided flow to get the right next privacy step for Tor Network.
Open Guided Flow