TrendingVideosIndia
Opinions | CommentEditorialsThe MiddleLetters to the EditorReflections
Sports
State | Himachal PradeshPunjabJammu & KashmirHaryanaChhattisgarhMadhya PradeshRajasthanUttarakhandUttar Pradesh
City | ChandigarhAmritsarJalandharLudhianaDelhiPatialaBathindaShaharnama
World | United StatesPakistan
Diaspora
Features | The Tribune ScienceTime CapsuleSpectrumIn-DepthTravelFood
Business | My MoneyAutoZone
News Columns | Kashmir AngleJammu JournalInside the CapitalHimachal CallingHill View
Don't Miss
Advertisement

Onion-encrypted anonymity: Navigating the dark web safely

InfoNugget: A process that makes it extremely difficult to trace you

Unlock Exclusive Insights with The Tribune Premium

Take your experience further with Premium access. Thought-provoking Opinions, Expert Analysis, In-depth Insights and other Member Only Benefits
Yearly Premium ₹999 ₹349/Year
Yearly Premium $49 $24.99/Year
Advertisement

How Tor browser works

Tor stands for The Onion Router – named for its method of encryption, which has many layers like an onion.

Advertisement

Step-by-step: How Tor keeps you anonymous

  1. You open the Tor browser and request to visit a website (e.g., http://example.onion).
  2. Your request gets encrypted multiple times and sent through a random series of at least 3 servers, called nodes:
  1. Each node decrypts one layer of the encryption and passes it on, but none of them know both your identity and your destination.

This process makes it extremely difficult to trace you.

Advertisement

Why it’s so anonymous

FeatureHow it protects you
Layered encryptionHides data as it passes through Tor network
Random routingMakes your path unpredictable
No logging by TorTor nodes don't store your activity
.onion sitesCan only be accessed within Tor network
Hides your IPThe destination website can’t see your real location

But it’s not 100% foolproof

Safe uses of Tor

Advertisement
Advertisement
Show comments
Advertisement