Tor - what it is, how it protects privacy, and smart ways to use it safely

Tor

What it is

Tor (The Onion Router) is a free tool that hides where you’re coming from online. When you use Tor Browser, your traffic is bounced through several volunteer-run relays before it reaches a website. Each hop only knows the next one, so sites can’t easily tie your activity to your IP or location. It’s privacy tech—not a magic cloak—and it doesn’t make risky downloads or bad passwords safe.

Why it matters

Tor helps keep your browsing more private on public Wi-Fi, reduces tracking, and lets people reach sites that might be blocked in their country. Journalists, researchers, and everyday users rely on it to avoid profiling and snooping.

How it works 

  • Layers (“onion”): your request is wrapped in layers of encryption.

  • Relays: traffic passes through entry → middle → exit relays.

  • Exit: the last relay talks to the website; your real IP stays hidden.

  • Tor Browser: adds anti-tracking and fingerprinting defenses by default.

Red flags

  • Logging into personal accounts (school, bank, social) can reveal who you are despite Tor.

  • Sites without HTTPS let exit relays see what you send.

  • “Free Tor” apps that aren’t Tor Browser (malware or fake services).

  • Torrents and some plugins can leak your real IP.

Do it right

  • Get Tor Browser from the official site and keep it updated.

  • Prefer HTTPS; don’t enter private details on HTTP pages.

  • Avoid logging into accounts that tie back to your real identity.

  • Don’t install extra browser add-ons; they can fingerprint you.

  • If Tor is blocked, use bridges (built-in option) to connect.


    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • Web Protection

        What it is Web protection is a bundle of tools and settings that keep you safer while you browse. It blocks dangerous sites and downloads, warns about fake logins, filters sketchy links, and helps keep your info private. It can run on your device ...
      • Web Cache Poisoning

        What it is Web cache poisoning is when attackers sneak bad content into a website’s cache. The cache is a “shortcut” server use to make pages load faster for everyone. If it’s poisoned, later visitors get the attacker’s fake version instead of the ...
      • Security Software

        What it is Security software is a set of apps and services that protect your devices and data from hackers, malware, and mistakes. It covers tools like antivirus/anti-malware, firewalls, VPNs, email and web filters, intrusion detection/prevention, ...
      • SAML (Security Assertion Markup Language)

        What it is SAML is a standard that lets you use one login to access multiple websites and apps. You sign in once at an identity provider (like your company or school account), and that provider sends a signed “assertion” to other services proving who ...
      • WHOIS

        What it is WHOIS (pronounced “who is”) is a public lookup for domain names. Type a domain, and WHOIS tells you who owns it (or their registrar/proxy), when it was registered, when it expires, and where it’s hosted. It’s like a phone book for ...