

Journalists, legal activists, whistle-blowers, people living in a country with censorship are the primary audience for Tor. Typical use cases for TOR include individuals who want evade hostile government censorship, people who want to avoid surveillance should use Tor to ensure maximum privacy over the Internet. If you want to make sure that your entire online activity and personal information stays secret, Tor can help. Most people believe that their identity is fairly protected under normal usage conditions, but if you are not using a VPN or Tor, there’s a good chance your identity is already out, or easily traceable. It works very much like the broader internet does, except only using nodes (relays) that will ensure the user anonymity. When you browse to a site using Tor, instead of sending your network packets directly to the server, Tor uses a passage of randomly assigned nodes to send your packet anonymously to the server without ever revealing your true identity.

There are volunteers for the Tor network who use their computer as “nodes” in the network. How does Tor work?Īs mentioned above Tor uses the onion routing technique to keep your identity secret and your browsing activity anonymous. The Tor logo represents an anonymous onion in reference to the technology used. Tor uses the onion routing technique to hide the information about its user’s identity and activities. Originally developed with the US Navy in the mid-90s, Tor project, a Non-profit organization (NPO) that advocates for internet privacy and security. Tor a.k.a The Onion Router is a worldwide network that protects your identity online and enables you to browse the internet anonymously.

Although current security measures are deemed “good enough” by most users, Tor has been created to go farther for users who want to get as anonymous and safe as possible. There are prying eyes on you ranging from Governments, local Internet Service Providers (ISP), or even hackers out there trying to get a piece of your information. The Internet is not always a secure place for exchanging information.
