An open source privacy network that permits users to browse the web anonymously. Tor was initially developed and solely used by the US Navy to censor government communications before the network was made available to the public.

Tor is short for The Onion Router.


The digital era has disrupted the traditional way of doing things in every sector of the economy by introducing products such as e-commerce, social media, cryptocurrency, cloud computing, and big data. The rapid rise in the development and innovation of digital products has given way to frequent data breaches and cyber thefts. To this effect, consumers are increasingly opting for products that profess data privacy and cybersecurity. Users that engage in digital marketplaces, digital payments, and community forums are demanding more anonymity in the way their online communications and transactions are shared. Data anonymization platforms are meeting these demands in the forms of dark wallets and underground networks. Tor is one of such underground networks that was implemented for the purpose of protecting users’ identities.

The Tor network uses an onion routing technique for transmitting data, hence, the original name, Onion Router. How does Tor work? To operate within the Tor network, a user has to install the Tor browser. Any address or information requested using the browser is transmitted through the Tor network. Normally, each user’s computer that accesses the internet is given an IP address by an internet service provider (ISP). With traditional browsers, when a user requests or enters a domain name (e.g. into the address bar, s/he is requesting the IP address of that domain. The network retrieves an IP address that is paired to that domain name from the DNS (Domain Name System) and sends it back to the user’s IP address once access is authorized. With Tor however, the Tor network intercepts the traffic from your browser and bounces a user’s request off a random number of other users’ IP addresses (computers) before passing the user’s request onto the final destination. The network sends the information to User A’s IP address, which encrypts the information and passes it on to User B’s address, which performs another encryption and passes it on to User C’s address, which is the last address known as the exit node. This last node decrypts the encrypted data and finally relays the request to the final destination (say, This final address thinks the request came from the exit node, and grants access to it. The encryption process across multiple computers repeats itself from the exit node to the original user.

The Tor network obfuscates users’ IP addresses from unwanted surveillance by keeping the users’ requests, communications, transactions, and identities untraceable and private, but not necessarily secure. While there may be some legitimate reasons for wanting one’s data anonymized like to protect top government sensitive information, the use of underground networks also opens the door to illegal activities. The Silk Road site, a notorious underground marketplace known for hosting illegal drug transactions in Bitcoin currency and subsequently shut down by the FBI in 2013, used the Tor network as its host. In 2016, the FBI used complex hacking skills to crack down on owners and users of a Tor-hosted website called Playpen, considered the largest child pornography website.

Tor network is one of the many examples of emerging technologies that attempt to fill a data privacy void in a digital space plagued by cybersecurity concerns. Its open source feature means that its source code is accessible to any user to upgrade or enhance. This in turn means that more advanced versions of anonymized networks are bound to emerge over the years.

  1. Silk Road

    A digital platform that was popular for hosting money laundering ...
  2. De-Anonymization

    De-anonymization is a reverse data mining technique that re-identifies ...
  3. Dark Wallet

    A digital wallet that enables data anonymization by obfuscating ...
  4. Networking

    Networking is a process that fosters the exchange of information ...
  5. Coinjoin

    Coinjoin is an anonymization strategy that protects the privacy ...
  6. Data Anonymization

    A data privacy technique that seeks to protect private or sensitive ...
Related Articles
  1. Insights

    What Is the Dark Net?

    The Dark Net (or Darknet) is a subset of secret websites that exist on an encrypted network.
  2. Investing

    Analysts: Twitter Should Shift Its User Focus

    Some analysts want Twitter to concentrate more on daily active users than monthly active users.
  3. Tech

    Facebook Now Has More Users in India Than in Any Other Country

    India has surpassed the U.S. in terms of daily active users on Facebook and presents a growth opportunity for the social media network operator.
  4. Small Business

    What Facebook Owns That Other Social Media Do Not (FB)

    Examine Facebook's competitive advantage to understand how the network effect and application suite set it apart from other social media platforms.
  5. Investing

    Social Media Will Soon Hit 2.5B Users: eMarketer

    Social media usage is forecast to jump more than 8% this year to 2.46 billion users worldwide.
  6. Investing

    eMarketer: Instagram to See 27% Growth in Germany

    Instagram may see high user growth in Germany at the same time parent Facebook's growth slows.
  7. Tech

    Blockchain Is Changing How Dating Apps Work

    As cryptocurrencies and their underlying technology become more popular, blockchain-based dating apps are taking off.
  8. Investing

    Why Facebook Will Never Charge User Fees (FB)

    Understand why Facebook is unlikely to ever charge users; the site's business model of leveraging free users to charge advertisers is highly profitable.
  9. Investing

    Twitter: A Company in Search of a Turnaround Story (TWTR)

    Will Twitter's most recent earnings report bring good news to the company's investors?
  10. Tech

    New Bitcoin Malware Changes Destination Wallets

    Though Bitcoin is designed to guard against fraud, one recent set of incidents points to a way that the currency can be stolen.
  1. What are the advantages of paying with Bitcoin?

    Learn how payments made with Bitcoins offer certain advantages over standard currency, including user anonymity, no taxation ... Read Answer >>
  2. How do Internet companies profit if they give away their services for free?

    Learn how companies in the Internet sector make a profit when service, content and user applications are offered at no cost ... Read Answer >>
  3. What metrics are commonly used to evaluate companies in the internet sector?

    Discover the best metrics to evaluate Internet companies. Internet companies are unique in that their costs are low but potential ... Read Answer >>
  4. Who are Facebook's (FB) main competitors?

    Explore the different social media networking sites and internet companies that are competing directly with Facebook, such ... Read Answer >>
  5. How does Twitter make money?

    Learn how Twitter earns revenue, including how the social media company uses three targeted advertising streams, data farming ... Read Answer >>
Hot Definitions
  1. Federal Funds Rate

    The federal funds rate is the interest rate at which a depository institution lends funds maintained at the Federal Reserve ...
  2. Call Option

    An agreement that gives an investor the right (but not the obligation) to buy a stock, bond, commodity, or other instrument ...
  3. Standard Deviation

    A measure of the dispersion of a set of data from its mean, calculated as the square root of the variance. The more spread ...
  4. Entrepreneur

    An entrepreneur is an individual who founds and runs a small business and assumes all the risk and reward of the venture.
  5. Money Market

    The money market is a segment of the financial market in which financial instruments with high liquidity and very short maturities ...
  6. Perfect Competition

    Pure or perfect competition is a theoretical market structure in which a number of criteria such as perfect information and ...
Trading Center