This site uses cookies to make your browsing experience more convenient and personal. Cookies store useful information on your computer to help us improve the efficiency and relevance of our site for you. In some cases, they are essential to making the site work properly. With Accept you agree to store cookies on your device to analyze the use of the site in order to improve the browsing experience. For more information, visit our cookies policy.
Login

Tor

This relay acts as a buffer, passing encrypted data between the entry and exit nodes. It knows neither the origin nor the destination of the traffic.

Tor operates on a principle known as . Unlike standard browsers that connect you directly to a website, Tor bounces your connection through three distinct layers of volunteer-run servers (relays): This relay acts as a buffer, passing encrypted

The final relay decrypts the last layer and sends your request to the destination website. The website sees the exit node's IP address instead of yours. Key Benefits of Using Tor Five Years as an Exit Node Operator | The Tor Project Unlike standard browsers that connect you directly to

* May 8, 2026. RightsCon 26, Lusaka, Zambia. * June 14, 2025. W3PN Neo-Cypherpunk Summit. * June 23, Using Tor hidden services for good | The Tor Project RightsCon 26, Lusaka, Zambia

Your computer connects to this first relay, which sees your real IP address but cannot see what you are doing or where you are going.

Follow Us