Tor, what you need to know and how it protects your privacy

tor guide
David Gilder/Flickr

This is a word that’s been tied to Edward Snowden, The Silk Road, and Bitcoin. Even the NSA made the front page with its very own PowerPoint presentation on the many challenges it faced while trying (and failing) to crack its elaborate code. What is Tor, where did it come from, and why can’t people stop talking about it?

What’s a Tor?

Tor, (short for “The Onion Router”) was initially launched in 2002 by a small team of anonymization enthusiasts who were looking for a new way to connect with each other without relying on the standard routers that were available to the public. The network is based off technology that dates back to the mid-1990’s, developed by the US Naval Research Laboratory in conjunction with DARPA as a method for sending classified documents between agencies over the backbone of the early internet.

Tor works by creating a series of relays in what’s known as a “meshnet.”

To put it simply, Tor works by creating a series of relays in what’s known as a “meshnet,” a collection of nodes run by anyone who wants to support the service that jump from one to the other in random succession. Each link in the chain is completely untraceable from the last, and depending on your preferred level of protection (and tolerance for a slow connection), your search queries, website visits, and communications can hop from as little as three to as many as 50 different locations around the globe before they successfully transfer from sender to receiver.

It’s these gaps that make the traffic especially difficult (and some would argue impossible) to track. Because the information is split up into thousands of individual packets that each enter and exit from different servers, it takes an excessive amount of time and energy to find the source or the intended recipient without a hefty chunk of know-how and ingenuity on behalf of your would-be surveiller.

So, now that we know how it works, what exactly can we do with it?


Right out of the gate you should know you can’t visit any old website while attached to the Tor network.

Because many of our favorite portals still use a litany of hidden cookies, browser data, and logging software to figure out who we are, what we’re doing, and how that information can be monetized for advertisers, Tor connects to a different part of the web, known as the “dark web.”

This is not to be confused with the “deep web,” which is primarily made up of servers full of corporate data that Google doesn’t index for general viewing. Instead, the dark web is a series of destinations known as “onions,” which can be anything from the aforementioned online drug markets (“The Silk Road” might ring a bell if you keep up on these kinds of things), to something as simple as a list of resources that people can rely on for fully encrypted communications.

Other useful .onions include the mainpage of WikiLeaks, the encrypted messaging app TorChat, and the popular privacy-focused search engine DuckDuckGo.

In the interest of keeping these sites functional and out of the public eye we won’t be revealing their exact addresses in this article, but they can easily be accessed by heading over to the Tor Onion Wiki on the project’s website here.


When you try to connect to Tor you’ll find its software offers two different ways to connect to the mesh. You can either let the system automatically choose your entrance and exit “nodes” (the servers that handle traffic) for you, or you can custom select which locations fit your needs best and cherry pick from there.

There’s still a number of rough edges that need to be ironed out if it’s to become a fully trustworthy way to keep your identity safe online.

Granted, you should be very careful while selecting the nodes you use and the nodes that are tossed aside, as just a few weeks ago members of the infamous hacking collective Lizard Squad took control of around 3,000 exit relays using a zero-day they’d discovered while breaking down the internal code.

Of course, they themselves use the service for everything from coordinating attacks to sending files between countries, so shortly after proving their concept they contacted the dev team behind Tor to work on a solution that would strengthen the network and prevent the mishap from becoming a bigger problem in the future.


As it stands, all versions of Tor still need to glom onto the Firefox browser in order to work properly. The basic Tor installation comes with its own customized build, but you can also use your own browser with an extension to run it without a hitch.

Image Credit: Wikimedia

Be forewarned that this is not exactly recommended, as your Firefox installation will probably have data that could be used to link you to a node (namely the bits and bytes held in Java). Still, this is a viable option if you don’t want to go the extra mile of installing a new Tor-specific browser.


Finally, for seriously devout privacy advocates, there’s Tails. This open source operating system based loosely on Linux modifies the entire operating system to create a hardened, encrypted OS that fits snugly on a USB stick.

It’s a similar concept to what we saw from the Windows-To-Go system from Iron Key; custom thumb drives created to encrypt your data and movements no matter where you are in the world.

For those who want a one-stop, no-hassle way to ensure that all of your personal data and information is as safe as possible from prying eyes, Tails OS is a perfect way to wrap everything you do into one tightly knit, almost untraceable package.


Tor is an excellent option if you’re concerned about privacy, want a secure, discreet way to communicate with friends, and have a rudimentary knowledge of how the Internet works. It’s not flawless, and there’s still a number of rough edges that need to be ironed out if it’s to become a fully trustworthy way to keep your identity safe online, but for now it’s the best bet we’ve got and should be a staple addition to anyone’s toolkit who values personal privacy above all else.

To get started with Tor you can visit the project’s website for a detailed breakdown of the instructions you’ll need to get things rolling in the right direction.


Think iPhones can’t get viruses? Our expert explains why it could happen

If your iPhone has been acting strangely, then you may be concerned about the possibility it is infected with a virus or some malware. We take a look at just how likely that is and explain why iOS is considered relatively safe.

Don't take your provider's word for it. Here's how to test your internet speed

If you're worried that you aren't getting the most from your internet package, speed tests are a great way to find out what your real connection is capable of. Here are the best internet speed tests available today.
Movies & TV

No TV? No problem. Here's how to watch the Final Four online

Whether you want to watch the Big Dance on your phone or on your smart TV, we have the lowdown on the ways to watch all the March Madness you can handle. Grab your foam finger and some nachos.

Protecting your PDF with a password isn't difficult. Just follow these steps

If you need to learn how to password protect a PDF, you have come to the right place. This guide will walk you through the process of protecting your documents step-by-step, whether you're running a MacOS or Windows machine.

At $99, Nvidia’s Jetson Nano minicomputer seeks to bring robotics to the masses

Nvidia announced a new A.I. computer, the Jetson Nano. This computer comes with an 128-core GPU that Nvidia claims can handle pretty much any A.I. framework you could imagine. At $99, it's an affordable way for A.I. newbies to get involved.

Nvidia’s A.I. Playground lets you edit photos, experience deep learning research

Nvidia is making it easier to access information on deep learning research. It has launched an online space with three demos for image editing, styling, as well as photorealistic image synthesis. 

Amazon and Nvidia bring artificial intelligence to the cloud with T4 GPUs

Nvidia announced the availability of new mainstream servers optimized to run the company's latest T4 GPUs with Turning architecture. Amazon jumped on board immediately, announcing that new AWS EC2 G4 instances will offer the technology.

Calibrate your display to get it looking just the way you like it

Want to see images the way they're intended to be seen? Here is our quick guide on how to calibrate your monitor using your operating system or another tool, to make what's on the screen look as good as it can.

How to change your Gmail password in just a few quick steps

Regularly updating your passwords is a good way to stay secure online, but each site and service has their own way of doing it. Here's a quick guide on how to change your Gmail password in a few short steps.

Sending SMS messages from your PC is easier than you might think

Texting is a fact of life, but what to do when you're in the middle of something on your laptop or just don't have your phone handy? Here's how to send a text message from a computer, whether you prefer to use an email client or Windows 10.

Netgear’s new Nighthawk Tri-band AX12 router brings Wi-Fi 6 speeds to the masses

Available in May for $600, the Nighthawk Tri-band AX12 router allows for maximum Wi-Fi performance on smart home devices and offers everything needed for gaming, streaming, and other high-bandwidth applications. 
Home Theater

Smart speakers are about to get an IQ bump thanks to new Qualcomm chips

Qualcomm announced a new chipset that is designed to make the next generation of smart speakers sound, listen, and connect better than ever before, and it could soon be in your living room.

Reluctant to give your email address away? Here's how to make a disposable one

Want to sign up for a service without the risk of flooding your inbox with copious amounts of spam and unwanted email? You might want to consider using disposable email addresses via one of these handy services.

Edit, sign, append, and save with six of the best PDF editors

Though there are plenty of PDF editors to be had online, finding a solution with the tools you need can be tough. Here are the best PDF editors for your editing needs, no matter your budget or operating system.