
You can also configure it manually assuming you are familiar with Tor’s architecture, although the tool does offer extensive documentation should you run into any trouble. Tor secures your online traffic by bouncing your communication around a distributed network of servers called onion routers.Īfter a quick setup, Tor will display a message in the command prompt window to let you know that the client is working properly. What’s more, Tor also include a platform that lets developers create software products that include privacy and anonymity features.īrowsing the web unprotected allows organizations, governments, companies and even experienced individuals perform traffic analysis and track your location as well as your online usage patterns. So, three layers of protection secure your activity in transit from you. When you connect, your activity is sent through three different voluntarily operated servers around the world. Tor's icon is an onion because like an onion, Tor's has layers that encrypt your internet connection.



Tor is a collection of software tools designed to keep you anonymous online regardless if you’re web browsing, chatting via IM, using IRC, SSH or another app that relies on the TCP protocol. Tor is an internet browser run by volunteer-operated servers. A toolset designed to help you stay safe and anonymous while browsing the web
