Table of Contents Expand Table of Contents What Is Tor? A User Guide Tor's Onion Routing and Encryption Diverse Applications FAQs The Bottom Line Understanding Tor: Anonymous Browsing, Usage, and Legal Aspects By The Investopedia Team Full Bio Investopedia contributors come from a range of backgrounds, and over 25 years there have been thousands of expert writers and editors who have contributed. Learn about our editorial policies Updated September 07, 2025 Reviewed by JeFreda R. Brown Reviewed by JeFreda R. Brown Full Bio Dr. JeFreda R. Brown is a financial consultant, Certified Financial Education Instructor, and researcher who has assisted thousands of clients over a more than two-decade career. She is the CEO of Xaris Financial Enterprises and a course facilitator for Cornell University. Learn about our Financial Review Board Fact checked by Melody Kazel Close What Is Tor? Tor—short for the Onion Routing project—is an open-source privacy network that enables anonymous web browsing. The worldwide Tor computer network uses secure, encrypted protocols to ensure that users' online privacy is protected. Tor users' digital data and communications are shielded using a layered approach that resembles the nested layers of an onion. The U.S. Navy initially developed Tor technology to protect sensitive government communications. The network was later made available to the public as an open-source platform, meaning that Tor's source code is accessible to everyone. Tor is upgraded and enhanced by volunteer developers in the Tor network. Key Takeaways Tor is an open-source network that uses encrypted protocols to provide anonymous web browsing.Originally developed by the U.S. Navy, Tor is now publicly available and maintained by volunteer developers.The Tor browser can be downloaded for free and works on multiple operating systems, including Windows, Android, and Apple devices.While Tor can enhance online privacy for various users, it is also criticized for being used for illegal activities.The legal use of Tor is permissible, though certain practices can still expose a user's identity. Getting Started With Tor: A User Guide To access the privacy and security features of Tor, you need to install the Tor browser. For that, you need an Internet connection and a compatible operating system. Tip You can download Tor at the Tor website. Follow the instructions to install the browser just like you would any other application on your device. You can watch tutorials within Tor to learn how to navigate the browser. Tor lets users customize their privacy settings, although the standard settings are considered to be sufficiently private for average users. Making Tor more secure can limit access to some websites. Understanding Tor's Onion Routing and Encryption Though knowing how the Tor network works is not necessary to use its browser, you may be curious about how Tor operates. Tor uses a layered routing method, like an onion, to send data. When you use the Tor browser to digitally communicate or access a website, the Tor network does not directly connect your computer to that website. Instead, Tor intercepts your browser traffic and routes it through several random computers before it reaches its final destination. Fast Fact Many dark web enterprises and activities are only accessible via Tor. This same process is reversed to enable the destination website to communicate with you, the Tor user. Tor's encryption hides user identities and activities while allowing normal internet use. Users of Tor: Analyzing the Diverse Applications While Tor is known for illicit uses, many people use it for valid reasons. Here's who uses Tor and why: Government agencies: Tor can protect and securely share sensitive government information. For-profit enterprises: Companies that use Tor can benefit from increased data privacy and security. Illicit organizations: Criminals sometimes use Tor to shield their online activity. Private individuals: Anyone wishing for more online privacy and better cybersecurity can benefit from the Tor browser. Journalists, activists, and people facing censorship may choose to interact online via Tor. Important In 2016, the FBI successfully investigated and identified owners and users of a Tor-hosted website called Playpen, which was considered the largest child pornography website on the Internet. Sites like Silk Road, a Tor-hosted underground marketplace known for facilitating illegal drug sales, garner the most headlines for Tor. But many Tor users have legitimate reasons for wanting to privately browse the web, especially in an era when cybercrime is on the rise. Is Tor Legal? Tor is legal to use. Tor is not meant for illegal activities by its users or operators. Does the Tor browser Hide Your IP address? The Tor network functions to obscure your IP address, but several scenarios can cause your activity in the Tor browser to be less than completely anonymous. Using a web browser configured to use Tor as a proxy, a torrent file-sharing application, or some browser plug-ins can all result in your online identity being revealed. Is Tor Free? Yes, the Tor browser is free to download and use. Tor supports web browser versions for Windows, Android, and Apple devices. The Bottom Line Tor, originally developed by the U.S. Navy, is an open-source privacy network designed to provide anonymous web browsing through encrypted protocols and layered nodes. While Tor enhances online privacy and data security, it is also controversial due to its association with illicit activities on the dark web. Nonetheless, it serves legitimate purposes for government agencies, for-profit enterprises, and individuals seeking added security, such as journalists and those facing censorship. While Tor is legal to use, users must be aware that certain activities can compromise anonymity. Despite its complexities, Tor remains a valuable tool for those prioritizing privacy in their digital interactions. Article Sources Investopedia requires writers to use primary sources to support their work. These include white papers, government data, original reporting, and interviews with industry experts. We also reference original research from other reputable publishers where appropriate. You can learn more about the standards we follow in producing accurate, unbiased content in our editorial policy. The Tor Project. "History." The Tor Project. "Security Settings." Federal Bureau of Investigation. "‘Playpen’ Creator Sentenced to 30 Years." The Tor Project. "The Legal FAQ for Tor Relay Operators." The Tor Project. "Am I Totally Anonymous If I Use Tor?." The Tor Project. "Defend Yourself." Compare Accounts Advertiser Disclosure × The offers that appear in this table are from partnerships from which Investopedia receives compensation. This compensation may impact how and where listings appear. Investopedia does not include all offers available in the marketplace. Read more Investing Stocks Tech Stocks Partner Links Take the Next Step to Invest Advertiser Disclosure × The offers that appear in this table are from partnerships from which Investopedia receives compensation. This compensation may impact how and where listings appear. Investopedia does not include all offers available in the marketplace.