A hand holding a purple onion with sparkles around it.

Wanna protect your online privacy? Smart move!

But before you slap on that fake mustache, chances are that you ran into something called the Tor Browser. While some security-minded surfers are ditching other browsers in favor of Tor, it’s not all sunshine and rainbows.

What is Tor, how does it work, and what are its benefits and risks? Let’s break it all down.

Table of contents

    What is Tor?

    Tor (short for The Onion Router) is a web browser designed to enhance online privacy and anonymity. Officially dubbed the Tor Browser, it helps people stay anonymous by masking their IP (Internet Protocol) address and encrypting their internet traffic. This lets Tor users hide their browsing habits from network administrators, ISPs (Internet Service Providers), and other third parties.   

    The whole Tor network is based on the idea of onion routing, which was developed by the US Navy in the 1990s to protect sensitive government communications. And even though we can’t all be Jason Bourne, the Tor network has become popular among privacy enthusiasts, journalists, and internet users who care about protecting their identity. 

    Today, it’s all managed and maintained by the Tor Project, a volunteer-led nonprofit organization dedicated to advancing internet freedom and privacy.

    How does Tor work?

    Tor uses onion routing to direct your web traffic through multiple independent nodes (aka onion routers) within the Tor network. Here are the three kinds of nodes:

    • Entry node: this is the point where your traffic enters the Tor network. The entry node sees your real IP address but doesn’t know your web traffic’s final destination;
    • Relay nodes: these middle nodes move your encrypted traffic forward through the Tor circuit. Relay nodes don’t see your traffic’s origin or its destination;
    • Exit node: this is the last node in the Tor circuit. Here, your web traffic exits the network and reaches its final destination. While the exit node sees this destination, it can’t trace any traffic back to your actual IP address.
    An infographic illustrating how the Tor network works.

    These layers of encryption — which resemble the layers of an onion — are supposed to ensure that your browsing history, online activities, and internet traffic can’t be tracked. In theory, you’re anonymous on the web.   

    In practice? Well, since volunteers run the Tor network’s nodes, your safety ultimately hinges on each person’s skills and goodwill. Because of this, you can’t really be sure you’re getting 100% privacy on Tor.

    How to use Tor

    Even though Tor looks spiffy under the hood, you can use it just like any other browser. To start using it, follow these steps:

    1. Download Tor: go to the Tor Project website and download the Tor Browser to your device. Tor is available for Windows, macOS, Linux, and Android devices. For iPhones, the Onion Browser app is recommended.
    2. Install Tor: use the provided instructions to set up the Tor Browser. Due to built-in privacy features and bundled components, installation may take longer than it would for other popular browsers.
    3. Launch Tor: open Tor and start surfing anonymously. Apart from a reduced internet speed and a few more CAPTCHAs, using the Tor Browser shouldn’t feel too different from what you’re already familiar with.

    Visit our How to use Tor guide for a detailed look at getting the browser up and running.

    Tor use cases

    What can you actually do with the Tor Browser? Here are the most common uses:

    Gain more online privacy

    One of the main reasons internet users turn to Tor is to achieve greater anonymity. Since the Tor web browser hides IP addresses, it’s incredibly difficult for anyone to monitor your internet activity or collect your online data.    

    Communicate more securely

    The Tor Browser is often used to protect sensitive messages, like those from activists or whistleblowers. Tor’s onion network encrypts and routes data through multiple layers, so communications between internet users can’t be tracked or intercepted.

    Believe it or not, even Edward Snowden used the Tor Browser to leak classified documents to journalists in his high-profile 2013 case. 

    Access .onion websites

    Tor users can reach .onion websites that can’t be found with other browsers like Chrome or Safari. These sites offer strong privacy protection and are designed to keep you anonymous. A popular example is the .onion version of the DuckDuckGo search engine, which lets you search the web without being tracked and find sites not indexed by traditional search engines.  

    Benefits of using Tor

    The increased privacy and security that the Tor Browser provides translate to the following benefits for users:

    Protection against surveillance

    The Tor Browser shields your online activity from third-party monitoring by encrypting and routing your internet traffic through a series of nodes. It’ll be encrypted even if ISPs, snoops, or hackers intercept any of your data. This prevents them from accessing your personal information — even on public internet networks. 

    Online anonymity

    While fully anonymous browsing is almost impossible, Tor shields your online activity by preventing websites and online services from tracking your real IP address. This makes it much more difficult for anyone to trace and collect data about what you do online. The Tor Browser can also limit sites’ or advertisers’ ability to profile your online identity. Third parties can’t effectively use cookies or scripts thanks to Tor’s ability to rotate IP addresses frequently.

    Censorship circumvention

    The Tor Browser helps you bypass censorship and access more information. Some governments impose restrictions that limit people’s online freedom. Tor combats this by encrypting web traffic and disguising a user’s IP address. As a result, you can communicate more freely.

    Risks of using Tor

    While using the Tor Browser could increase your overall online security, it comes with the following potential risks and drawbacks:

    • Slow connection speeds: Tor’s onion routing requires web traffic to travel through multiple nodes to get encrypted. These layers of encryption can lead to a significantly slower internet connection;
    • Blocked websites: certain pages block traffic coming from Tor exit nodes, so users might not be able to access websites with their desired content and services;
    • Malicious nodes: anyone can technically set up a node on Tor’s onion network, so there’s a chance malicious actors can run compromised nodes to intercept data, especially at exit nodes where your web traffic is decrypted;
    • False sense of security: the Tor Browser is a powerful tool, but several factors can result in inconsistent performance. Online browser misconfigurations or improperly adding a plugin may cause some of your data to leak or leave you vulnerable to online threats;
    • Illicit content: Tor provides access to the dark web, where illegal activities are prevalent. Accidentally (or intentionally) engaging with these can pose major legal risks; 
    • Malware infections: many sites on the dark web contain harmful viruses and malware that can infect your device. The Tor Browser doesn’t offer any antivirus software to protect against this.    

    In sum, while Tor offers more privacy than your run-of-the-mill web browser, it doesn’t deliver substantial online security on its own. 

    One solution? Consider combining — or replacing — Tor with a reputable VPN (Virtual Private Network) like Surfshark to mitigate its risks and enjoy elevated protection. But more on that later.

    Is Tor safe? Head to our Is the Tor Browser safe? blog post for an in-depth answer to this million-dollar question.

    Tor vs. VPN

    Tor and VPNs are both tools designed to boost online privacy, but they work in different ways.

    Instead of a network of nodes, a VPN routes your web traffic through a secure server to encrypt your data and mask your IP address. Your data is only encrypted once, and the VPN provider itself operates the VPN server.

    Tor
    VPN
    Encryption method
    Independent nodes
    VPN server
    Operator
    Volunteers
    VPN provider
    Typical number of encryption levels
    Multiple
    One*
    Negative impact on speed
    Generally higher
    Generally lower
    Primary focus
    Anonymity
    Greater security, privacy, and access
    Scope of protection
    In-browser traffic
    Entire device

    *Some VPN providers offer multiple encryption levels. For example, Surfshark’s Dynamic MultiHop lets you route traffic through multiple servers to get additional encryption.

    When to use Tor

    When should you use Tor instead of a VPN? Believe it or not, Tor should rarely be your go-to option — if ever.

    While some use the Tor Browser to avoid surveillance or handle sensitive information, a VPN can do the same. Both Tor and VPNs provide greater online privacy and security, but VPNs offer more reliable performance that doesn’t depend on volunteers’ capabilities.

    Additionally, since using Tor often leads to a slower internet connection, the browser is only viable if you’re not taking care of time-sensitive tasks. Longer load times can lead to a clunky browsing experience, so a VPN is often a more efficient choice for anyone seeking enhanced online security.   

    When to use a VPN

    A VPN like Surfshark is preferred for internet users wanting increased privacy and security. 

    VPNs provide robust encryption without slowing down your internet speed, so all kinds of browsing — from streaming to internet banking — can be safely conducted with a VPN connection.

    Disclaimer: Please note that using Surfshark services for any illegal activities is strictly forbidden and violates our Terms of Service. Make sure that any use of Surfshark services for your particular activities conforms to all relevant laws and regulations, including those of any service providers and websites you access using Surfshark.

    A VPN can effectively protect a public Wi-Fi connection, offer access to more online content, and secure all internet traffic coming from and going to a device — not just the data on a browser.

    But what if you want only to protect your browser? A VPN can take care of that, too. With Surfshark’s VPN browser extensions for Chrome, Firefox, and Edge, you can encrypt your browsing traffic while leaving the rest of your device unaffected.

    Using Tor with a VPN

    Tor can help you stay private online, but no tool is perfect. Using the Tor Browser together with a VPN gives your internet security a significant upgrade.

    You see, a VPN helps users overcome many of Tor’s vulnerabilities. For instance, connecting to a VPN before opening your Tor Browser keeps your IP address hidden from the Tor entry and exit nodes. This minimizes the chances of IP addresses getting leaked and can help you bypass restrictions that block Tor users.

    Moreover, a VPN encrypts your traffic before it ever reaches the Tor network, making it even tougher for your data to get intercepted.

    For those seeking maximum privacy and security, activating a VPN while surfing on the Tor Browser is vital to safeguarding your online activities.

    Check out our comprehensive Tor over VPN article for more benefits and setup instructions.

    Enjoy enhanced safety with a VPN

    While it has its drawbacks, Tor offers a unique solution for private browsing. 

    For most internet users, however, a VPN provides an even safer, smoother surfing experience. A solution like Surfshark, which offers the best value for the price, can effectively boost your online security and overcome Tor’s various shortcomings.

    Browse securely with Surfshark
    See device-wide protection with a VPN
    Surfshark

    FAQ

    What is the Tor network?

    The Tor network is a decentralized internet system that routes web traffic through multiple encrypted layers and volunteer-run servers, making it more difficult to trace your online activity. This technology improves your internet privacy and is the backbone of the Tor Browser.

    What is the Tor Project?

    The Tor Project is a non-profit organization that maintains the Tor network and Tor Browser. Its focus is defending online privacy and allowing more people to explore the internet anonymously.

    What is Tor Browser?

    Tor Browser is a free, open-source web browser that routes traffic through the Tor network to increase user privacy and anonymity.

    It can be downloaded onto Windows, Linux, Android, and macOS devices. While a Tor Browser app isn’t available for iPhones, an iOS-friendly equivalent — Onion Browser — is available. 

    Is Tor Browser safe? 

    Tor increases your online privacy and anonymity, but it isn’t 100% safe. Threats like a malicious entry node or exit node can harm any unsuspecting Tor user, so it’s important to practice good security habits and remain cautious while using the Tor Browser.

    For greater online safety, consider using a VPN like Surfshark.  

    Is Tor legal?

    Yes, Tor is legal in most countries. However, law enforcement agencies in some countries, such as China, Russia, Iran, and Turkey, have restrictions or outright bans on the Tor Browser due to its ability to bypass government surveillance.

    Also, while Tor itself may be legal, it goes without saying that using the Tor Browser to engage in illegal activities on the dark web, accidentally or otherwise, is against the law.     

    What is Tor used for?

    Tor is commonly used to protect personal privacy and browse anonymously online. The Tor Browser also helps users communicate more securely and access restricted content, especially in regions with heavy censorship.  

    What is Onion Browser?

    Onion Browser is a free, open-source web browser designed for iOS devices. While no Tor Browser app is available for iPhones, Onion Browser still connects to the Tor network to give users greater privacy online.