Two hands typing on a laptop keyboard with an onion on the laptop screen.

The Tor Browser is an internet browser that is a part of the Tor Project. It sends your traffic through a volunteer-based network to provide privacy and anonymity online. However, there are some things you should know about before blindly trusting your privacy to Tor. Keep on reading to learn all about how the Tor Browser works.

Table of contents

    Is the Tor Browser safe? Safety benefits vs. issues at a glance

    The Tor Browser is safer than a regular browser as it offers a solid boost to your online privacy. But it does have known vulnerabilities. So if you browse, onion websites or want to be a whistle-blower online, you might want to secure yourself by running Onion over VPN

    Benefits
    Issues
    Three layers of encryption
    Entry node sees your IP, exit node sees your data
    Connects via three random nodes
    Nodes are run by volunteers and could be compromised
    Nodes are changed every five minutes
    Only browser traffic is encrypted, while all other traffic remains unaffected

    Verdict

    The Tor Browser is safe, but it’s not bulletproof. Your IP (Internet Protocol) address is vulnerable at the entry node, and your data is vulnerable at the exit node. Cracking both nodes and matching your IP to your data might be rare, but it’s not impossible. If privacy is your main concern, you should use a premium VPN together with Tor at all times.

    How Tor works

    The Tor Browser relies on a network of volunteers to encrypt your traffic and send it through three different servers, also known as nodes or relays. This process hides your IP address and protects your activity data from snoopers and any other intrusive third parties.

    When you access Tor, the entry relay can see your IP but not the data you are sending. The middle relay can see your data but not your IP. The same applies to the exit relay, which sends your data to the internet but doesn’t know where it’s coming from. These relays are changed every 5 minutes as a preventative measure against compromised relays.

    In theory, such a connection could be considered secure since no single relay has access to both your IP and data. However, the security issues linked with Tor prove that the system isn’t flawless.

    The security issues with the Tor Browser

    Most security issues linked to Tor are caused by the fact that its network is run by volunteers. This means that nearly anyone can set up a server and become a part of the network. As a result, your traffic may run through relays owned by malicious actors or even government agencies, such as the CIA.

    It’s easy to compromise a volunteer-run network

    With enough nodes, you can intercept the data going through the entry and exit nodes of the same circuit. This means that a person or group of people could hold both the entry and the exit relay of your connection at the same time. The more relays someone owns, the more likely it is to happen.

    Sure, the servers are changed every few minutes, but even a few seconds could be costly if you’re dealing with some sensitive information online.

    Malicious parties may collect data

    When a hacker-owned server acts as an entry node, hackers can record your IP and find out who you are. When a hacker-owned server acts as an exit node, hackers know what websites and services you accessed via that node.

    If they manage to collect enough data, malicious actors can piece together what you were doing online at one point or another

    Malicious parties can monitor data at the exit node

    Exit node eavesdropping means hosting nodes with the intent to harvest data as it becomes deciphered by the exit node. This may have been the case in 2021 when an unknown entity had compromised 900 Tor network nodes

    Suppose your traffic isn’t encrypted by TLS (Transport Layer Security) or VPN (Virtual Private Network). In that case, the person monitoring the exit node can capture sensitive data such as combinations of account names and passwords

    Tor exit nodes may be blocked

    Some websites and services block Tor IP addresses from accessing their content. It may happen if a Tor user breaks a service agreement, Terms of Use, or other company rules. On top of it, some websites may block Tor IPs if they notice an abundance of malicious activity coming from such addresses. 

    In addition, using Tor may be illegal in some countries due to dark web connections or because it provides online privacy, which some authoritarian governments don’t like. Since your internet service provider can tell that you’re using Tor, this can expose you to the authorities.

    But if someone knows that you’re using Tor, let’s consider if they can track you while you’re using it.

    Your devices can be infected with malware

    While Tor helps with your online privacy and anonymity, it doesn’t make you immune from malicious websites. The dark web, in particular, is full of malware. Make sure to use a reliable antivirus to protect yourself from such threats. Or get a Surfshark One subscription which combines Antivirus with premium VPN protection. 

    Stay safe online and offline
    Get the ultimate digital security bundle
    Surfshark

    Security levels vary on different devices

    Tor Browser has different levels of security due to platform constraints. It’s officially accessible on Android, Windows, Linux, and macOS. However, it is unavailable for iOS devices because Apple requires that either UIWebView or WKWebView rendering engine is used to create any browser for iOS.

    This requirement prevents Apple from developing a dedicated Tor Browser for Apple users. The closest alternative for iOS users is Onion Browser. It was developed by Mike Tigas, one of the volunteer core contributors at Tor.

    The Onion Browser doesn’t offer the same level of security as the official Tor Browser. So, if you need to use Tor to protect your privacy and anonymity, do so on a computer or an Android device.

    Can you be tracked on the Tor network?

    It is technically possible to track you on Tor. As discussed earlier, Tor’s connection-routing nodes have vulnerabilities. Here are two of the most common ways for third parties to track you on Tor:

    Triangulation

    Triangulation is possible by matching data from entry and exit nodes. To do so, a hacker needs to have access to both nodes. This would allow them to assume that traffic sent at a certain point in time is related to a post or comment that appears at the exit node one or two seconds later. 

    For example, a connection made at 9:51:15 a.m. may be linked to a post made on 9:51:16 a.m.

    Eavesdropping 

    Eavesdropping at the exit node may allow bad actors to steal user data. Tor traffic isn’t encrypted when it leaves the exit node. If someone manages to intercept the connection before it reaches the internet, they may be able to access sensitive data which can be linked to you.  

    Is the TOR Browser legal?

    Tor is legal in the majority of countries around the world. However, countries like Belarus, Turkey, Russia, Iran, and Saudi Arabia have specific regulations for Tor, while China blocks all Tor traffic. If you live in any of these countries, we advise you to research your legislation before using the browser.

    Using Tor can become dangerous in countries where it’s illegal. Your ISP (Internet Service Provider) doesn’t see what you do on Tor, but it can detect your internet traffic going via the Tor network. This means they can track when you use the browser and report Tor usage to the authorities.

    It is important to note that engaging in illegal activities while using Tor is still against the law in all countries.

    How to use the Tor Browser safely 

    We have written a dedicated article on how to use Tor safely, but here’s a shorter version for you: 

    • Set the Tor Browser security settings — go to Settings > Privacy & Security > Choose between three levels of security available to you: Standard, Safer, and Safest. Safer settings limit access to some features and may slow down your connection more.
    • Disable JavaScript — JavaScript may collect Personally Identifiable Information (PII) and has been prone to vulnerabilities in the past. Avoid such risks by simply disabling JavaScript altogether.
    • Don’t use personal accounts — don’t provide personal email addresses or other information on Tor, especially on .onion websites. Use burner accounts or make use of Surfshark’s Alternative ID feature to generate an alternative identity for Tor use.
    • Use New IdentityNew Identity is a Tor Browser feature that clears your cookies and cache, closes all windows, and starts a brand new connection with new relays. Use it periodically to delete traces of your previous activity on the browser.
    • Update your apps — updates often fix certain security issues or tackle zero-day vulnerabilities. To ensure optimal security, make sure your Tor Browser, VPN, and antivirus apps are always updated.
    • Use Tor over a VPN — a VPN encrypts your traffic before it reaches Tor, which protects you from Tor’s vulnerabilities at the entry and exit nodes. Overall, Tor over VPN provides the safest possible Tor experience, but it may slow down your connection significantly.

    What are the safety benefits of using Tor?

    Using the Tor Browser comes with a few risks, but there are still plenty of good reasons to give it a go and beef up your online security:

    It improves privacy

    Tor is specifically designed to improve your online privacy and anonymity. It encrypts your data, hides your traffic from third parties, and keeps your IP address secret, making it difficult for anyone to trace your online behavior back to you. 

    But if privacy is your main concern, consider using Tor together with a VPN. A VPN hides your real IP from the owner of the entry relay and eliminates the flaws in Tor’s encryption.

    It’s harder to compromise

    Tor’s network routes your internet traffic through multiple volunteer-operated servers and creates several layers of encryption. In theory, this system is harder to compromise. 

    In practice, volunteer networks can be infiltrated by bad actors. So Tor might be safer than a free VPN, but using a reputable premium VPN like Surfshark is even more secure. 

    It’s easy to use

    Over the years, Tor has become increasingly user-friendly. It’s easy to use and Tor users don’t need to be tech-savvy to browse the internet privately. Simply download the browser, launch it, and start browsing. It will automatically connect you through a secure node and walk you through the whole browser.

    It’s free

    It is free and open-source software run by a community of volunteers worldwide. While they do accept donations, you don’t have to pay for a premium version or subscription. 

    What is the difference between Tor, VPN, and Proxy?

    Tor — a network that bounces your internet traffic through multiple volunteer-operated servers. It is typically used to access .onion websites or improve privacy when browsing anywhere else. 

    VPN — a virtual private network. It creates a secure, encrypted tunnel between your device and a remote server while hiding your IP address.

    Proxy — a server that acts as an intermediary between your device and the internet, forwarding your web requests. It can change your IP but doesn’t encrypt data on its own.

    Here’s an analogy: think of your online journey as a package you’re sending through the mail.

    • Tor is like sending the package through a series of secret tunnels and mazes. It hides your package in a sealed box hiding it from everyone.
    • VPN is like sealing your package in a locked container and then sending it through a private courier service. The courier company knows where it’s going, but no one can peek inside the box.
    • Proxy is like asking a friend to deliver your package for you. Your friend will certainly drop it off, but anyone watching can still see the package. You are just using them as a middleman to handle your mail.

    What should I use?

    Here’s a specific use case for Tor, a VPN, and a proxy.

    Tor:

    You want to access .onion websites while also protecting your online privacy on other websites.

    Why Tor? .onion websites can only be accessed via the Tor browser. So if you visit such websites frequently, you can use Tor as your default browser. It will allow you to access what you need and protect your privacy on any website you visit. 

    VPN:

    You want privacy and security for all internet traffic, including browsers and apps.

    Why VPN? A VPN encrypts all traffic coming from your device; its protection is not limited to a certain browser or app. So when using a VPN, you can rest assured that your online privacy is protected no matter what you do.

    Tor over VPN:

    You want to ensure the best privacy protection for .onion websites.

    Why Tor over VPN? The dark web doesn’t exactly have a reputation as an online haven. If you want to use Tor for whistleblowing purposes or other sensitive activities on .onion websites, you need to use Tor over VPN. It might slow down your connection significantly, but it’s the safest option available.

    Proxy:

    You want to change your IP but don’t need encryption to protect your privacy.

    Why proxy? A proxy routes your traffic through a specific server and changes your IP. But it doesn’t encrypt your traffic, making proxy the least safe out of these options. Having a proxy server in your home country can be a great tool for accessing content and websites in your home country when traveling abroad.

    You should assess your needs when deciding between using Tor, a VPN, Tor over VPN, or a proxy. Keep in mind that there’s a trade-off between safety and speed. The more you prioritize privacy, the slower your internet connection might become.

    Is Tor safe, or should I look for alternatives?

    Using Tor is definitely safer than other mainstream browsers. But it’s far from a flawless solution for online privacy. In fact, just using a premium VPN will usually provide better protection than Tor. And if you really want to use Tor safely, you should do so by using Tor over VPN instead of just running the browser on its own. 

    Use Tor over VPN
    Get the best online privacy protection
    Surfshark

    FAQ

    Does Tor hide your IP?

    Tor hides your IP from the website or service you want to access. However, the Tor entry node sees your real IP (unless you’re using a VPN). 

    Is Tor anonymous?

    Nothing is 100% anonymous online. In the case of Tor, the entry node knows your IP, and the exit node can see the data you’re sending. It doesn’t pose a risk unless the same entity owns both nodes. 

    Is the Tor Browser safe without a VPN?

    Using Tor without a VPN isn’t always safe. Tor’s connections have some vulnerabilities at the entry and exit relays. If you use a VPN with Tor, these vulnerabilities are eliminated by the VPN’s encryption.

    Is using Tor legal in the US?

    Using the Tor browser is legal in the US, as well as Europe, and most other countries in the world. Its use is only illegal or restricted in Russia, China, Belarus, Iran, Saudi Arabia, and Turkey.