
The entry node server sends the packet on to a second server. This first server is the “entry node” to the Tor network.

When you send data through the Tor browser to some destination, Tor encrypts your data packet multiple times - “wrapping” it in several layers of encryption - and sends the whole thing to one of its volunteer relay servers. What makes Tor different is the way it routes data over its network. Tor is similar to other web browsers in that you install it on your computer and use it to access sites and services on the Internet. The Tor network is a distributed, volunteer-run network of relay servers spread out around the world. The Tor browser is simply a custom build of Firefox designed to route data through the Tor network. Tor offers a way to access the Internet safely and anonymously. Tor stands for “The Onion Router”, and can refer to either the Tor browser, or the Tor network.

Then, if you decide you’d like to explore Tor for yourself, we’ll also walk you through the installation process on macOS. We’ll answer some common questions we’ve heard about Tor - touching on issues of functionality, safety, and privacy. But if you’re like many people, you probably still have lots of questions about what it is, and what it does.

Want to learn more about Tor? Here’s a complete guide.You may have heard of Tor - perhaps you’ve seen it in films or TV shows that dramatize hacking, or mentioned in news stories about cybercrime and the “dark web”. However, because a lot of illegal activity does take place over Tor, simply connecting to it could arouse suspicions from law enforcement or your ISP. And some people use it to access websites censored in their country, including popular ones like Facebook. It is an important tool for dissidents and whistleblowers to communicate covertly. A more secure option is TAILS, an entire operating system that allows you to route all your data, from all programs, through the Tor network. The Tor Browser by default only protects your browsing data, not other applications running on the side, which all have to be configured separately. Though Tor is pretty much the gold standard for anonymizing your internet traffic, the system is slow and inefficient. The Tor Browser is optimized for security and privacy, unlike most other web browsers, which are optimized for speed and do not defend adequately against attacks such as browser fingerprinting. The Tor network is typically accessed through the Tor Browser, which is derived from Firefox.
