logo

Video encyclopedia

Tor

11:46

How to use Tor Browser | Tor Tutorial part 1

14:19

How TOR Works- Computerphile

1:56

How Tor Networks Work

6:14

Tor As Fast As Possible

2:25

What is Tor and Should You Use It? | Mashable Explains

Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than six thousand relays, to conceal a user's location and usage from anyone performing network surveillance or traffic analysis. Using Tor makes it more difficult to trace a user's Internet activity. Tor's intended use is to protect the personal privacy of its users, as well as their freedom and ability to communicate confidentially through IP address anonymity using Tor exit nodes.
    • History 

    • Usage 

    • Operation 

    • Originating traffic 

    • Onion services 

    • Nyx status monitor 

    • Weaknesses 

    • Consensus blocking 

    • Autonomous system (AS) eavesdropping 

    • Exit node eavesdropping 

    • Internal communication attack 

    • Traffic-analysis attack 

    • Tor exit node block 

    • Bad apple attack 

    • Some protocols exposing IP addresses 

    • Heartbleed bug 

    • Relay early traffic confirmation attack 

    • Mouse fingerprinting 

    • Circuit fingerprinting attack 

    • Implementations 

    • Tor Browser 

    • Firefox/Tor browser attack 

    • Tor Messenger 

    • Third-party applications 

    • Security-focused operating systems 

    • Reception, impact, and legislation 

    • 2011 

    • 2012 

    • 2013 

    • 2014 

    • 2015 

    • 2016 

    • 2017 

    • 2018 

    • 2019 

    • 2022 

    • Improved security 

    • Odds of detection