The Tor network, often referred to as just “Tor,” is a volunteer-run system that helps make internet use more anonymous.
When a user is connected to Tor (often through the Tor browser), their outgoing internet traffic is rerouted through a random series of at least three nodes (called relays) before reaching its destination (the website the user wants to visit). Your computer is connected to an entry node, and the final node traffic passes through is the exit node, after which it reaches its destination (the website you want to visit). Incoming traffic is rerouted in a similar manner.
Aside from passing through several nodes, the traffic is encrypted, multiple times in fact. It loses a level of encryption at each node, but is never fully encrypted until it leaves the exit node for its destination.
Each node has an identifying IP address, which is also encrypted. The only IP address visible to the destination website is that of the final node, known as the exit node.
In total, the Tor network is currently made up of about 7,000 relays (nodes) and 800 bridges. Bridges are similar to relays, but they are not listed in the Tor directory. These are typically used by anyone who is unable to access the Tor network by regular means, for example, if it has been blocked. They may also be used is a website or app blocks traffic from a detected
0 Comments: