What Is Tor?
Tor—short for "The Onion Routing" project—is an open source privacy network that enables anonymous web browsing. The network of computers worldwide in the Tor network uses secure, encrypted protocols to ensure that users' online privacy is protected. Tor users' digital data and communications are shielded using a layered approach that resembles the nested layers of an onion.
The Tor technology was initially developed and solely used by the U.S. Navy, to protect sensitive government communications. The network was later made available to the public as an open-source platform, meaning that Tor's source code is accessible to everyone. Tor is upgraded and enhanced by volunteer developers in the Tor network.
- The Tor network is a secure, encrypted protocol that can ensure privacy for data and communications on the web.
- Short for "The Onion Router," the system uses a series of layered nodes to hide IP addresses, online data, and browsing history.
- Originally developed by the U.S. government, critics consider Tor to be dangerous in the hands of some people, who may use the Tor network for illegal or unethical purposes.
How to Use Tor
To access the privacy and security features of Tor, you need to install the Tor browser. For that you need an internet connection and compatible operating system.
Follow the instructions to install the browser just like you would install any other application on your device. You can then watch tutorials within Tor that explain how to navigate the browser.
Tor lets users customize their privacy settings, although the standard settings are considered to be sufficiently private for average users. Customizing Tor to be the most secure can affect your ability to use certain websites.
How Tor Works
While knowing how the Tor network works is not necessary to use its browser, you may be curious to understand how Tor operates.
Tor uses an onion-style routing technique for transmitting data. When you use the Tor browser to digitally communicate or access a website, the Tor network does not directly connect your computer to that website. Instead, the traffic from your browser is intercepted by Tor and bounced to a random number of other Tor users’ computers before passing the request to the final website destination.
Many "dark web" enterprises and activities are only accessible via Tor.
This same process is reversed to enable the destination website to communicate with you, the Tor user. The encryption process that the Tor software uses obscures the identities, requests, communications, and transactions of Tor users while still enabling them to use the internet as they normally would.
Who Uses Tor and Why
While Tor is best known for its illicit uses, many internet users can have different, valid reasons for accessing the internet via Tor.
Let's take a closer look at who uses Tor and why:
- Government agencies: Tor can be used to protect and securely share sensitive government information.
- For-profit enterprises: Companies that use Tor can benefit from increased data privacy and security.
- Illicit organizations: Tor is used by some criminals to shield their online activity.
- Private individuals: Anyone wishing for more online privacy and better cybersecurity can benefit from using the Tor browser. Journalists, activists, and people facing censorship may choose to interact online via Tor.
In 2016, the FBI successfully investigated and identified owners and users of a Tor-hosted website called Playpen, which was considered as the largest child pornography website.
Sites like The Silk Road, a Tor-hosted underground marketplace known for facilitating illegal drug sales, garner the most headlines for Tor. But many Tor users have legitimate reasons for wanting to privately browse the web, especially in an era when cybercrime is on the rise.
Is Tor legal?
Tor is legal to use. Tor is not designed or intended to be used to break the law, either by Tor users or Tor network operators.
Does the Tor browser hide your IP address?
The Tor network functions to obscure your IP address, but several scenarios can cause your activity in the Tor browser to be less than completely anonymous. Using a web browser configured to use Tor as a proxy, torrent file-sharing applications, and some browser plug-ins can all result in your online identity being revealed.
Is Tor free?
Yes, the Tor browser is free to download and use. Tor supports web browser versions for Windows, Android, and Apple devices.