.

Tor


Reading time: less than 1 minute

Tor, short for The Onion Router, is a robust privacy network designed to enable anonymous web browsing through multiple layers of encryption. It was initially developed by the U.S. Naval Research Laboratory in the mid-1990s with the aim of protecting government communications. Over time, Tor has evolved into an open-source platform maintained by a dedicated community of volunteers.

The network functions by routing user traffic through a series of nodes, each encrypting the data like layers of an onion. This intricate process makes tracking online activities extremely challenging. Today, Tor is used for a variety of legitimate purposes, including safeguarding the privacy of journalists and whistle-blowers, helping individuals maintain their online privacy, and circumventing censorship.

Protocol

The Tor protocol is described by specifications. You can find the specs on spec.torproject.org.

Tor Browser

This is the recommended way for end-users to use Tor. It’s a hardened build of Mozilla Firefox that has a built-in Tor node.

Tags: Privacy Cryptography

The following pages link here

Citation

If you find this work useful, please cite it as:
@article{yaltirakli,
  title   = "Tor",
  author  = "Yaltirakli, Gokberk",
  journal = "gkbrk.com",
  year    = "2025",
  url     = "https://www.gkbrk.com/tor"
}
Not using BibTeX? Click here for more citation styles.
IEEE Citation
Gokberk Yaltirakli, "Tor", June, 2025. [Online]. Available: https://www.gkbrk.com/tor. [Accessed Jun. 30, 2025].
APA Style
Yaltirakli, G. (2025, June 30). Tor. https://www.gkbrk.com/tor
Bluebook Style
Gokberk Yaltirakli, Tor, GKBRK.COM (Jun. 30, 2025), https://www.gkbrk.com/tor

Comments

© 2025 Gokberk Yaltirakli