


You should have a basic idea of how Tor functions or some of its technical capabilities. Here’s an excerpt which might throw a bit more light on why and how the users remain anonymous and still serve as nodes. In his book “ Anonymous Communications Network”, Kun Peng has really done himself over in explaining every iota of detail related to TOR. Let me just add that, each of the “green lines” is a “hop”, and the latest hop has no idea of the connection or history/ path of the relay ( the green line) before connecting to itself, hence they’re all anonymous even to each other. The actual functioning of TOR is quite complicated ( or else it wouldn’t be as big a deal as it is, right?) but here’s an illustration from their site which explains things a bit: In other words, TOR users help each other, without compromising each other’s identity or security. It’s worth mentioning that at no time are any two ( or multiple) TOR users aware of each others presence, or identity. and is anonymous.Ī more advanced explain is, TOR is simply a browser which is run by volunteers across the globe, so that means real people from across the globe serve as TOR nodes, which helps keep the service decentralized, and anonymous. In layman’s terms, it’s a browser which doesn’t track you, leak your identity out on the web, isn’t censored by the govt. TOR is the abbreviation for “The Onion Router” as most of you probably know. Scribbling down an article on “How to use TOR?” and not elaborating a bit on what TOR exactly is just doesn’t seem fair. So without beating around the bush further, here we bring to you the basics of how to TOR. You might simply be a whistleblower trying to out some information, or you might be hardcore law breaker trying to buy drugs, and weapons it’s all possible with TOR. Today, TOR is used both for legitimate, as well as illegitimate purposes. Although what started off as an open source project to present its users with a sense of anonymity and security, has turned into a mass movement across the globe. Well, TOR is literally the most popular anonymous browser in the industry.

And clearly the increased prying eyes of the government, employers, and individual hackers are to blame for your need to seek out such a solution as this. How to use TOR? If you’re on this page, that’s clearly what you’re confused about.
