Tor (The Onion Router): What It Is and How It Works

If online privacy matters to you, you've likely heard of Tor. It's one of the most powerful tools available for anonymous browsing — and understanding how it works helps you make smarter decisions about when to use it, when to use a VPN, and when to combine both.

What Is Tor?

Tor stands for The Onion Router. It's a free, open-source anonymity network originally developed by the U.S. Naval Research Laboratory and now maintained by the nonprofit Tor Project. Anyone can download the Tor Browser and use the network at no cost.

Unlike a regular browser that connects directly to a website — revealing your IP address and location — Tor bounces your traffic through a series of volunteer-run servers called relays or nodes. By the time your request reaches its destination, the origin is nearly impossible to trace back to you.

How Does Tor Work?

This is where the "onion" metaphor comes in. Tor wraps your data in multiple layers of encryption — like the layers of an onion — before sending it through the network.

Here's the basic process:

  1. Your Tor client encrypts your traffic in three layers and connects to the Tor network.
  2. The entry node (guard node) knows your real IP address but can't see your destination or the content of your traffic.
  3. The middle relay passes your data along without knowing where it came from or where it's going.
  4. The exit node decrypts the final layer and sends your request to the destination website. It can see the destination but not who you are.

No single node ever has the full picture. This distributed trust model is what makes Tor so effective for anonymity — and why it's fundamentally different from a VPN, which routes all your traffic through a single server operated by one company.

Why Does This Matter for VPN Users?

If you already use a VPN, you might wonder why Tor is relevant to you. Here's the key distinction: a VPN hides your traffic from your ISP and masks your IP address, but you're still trusting your VPN provider with your data. A no-log VPN mitigates this, but trust is still involved.

Tor removes that single point of trust entirely. However, it comes with trade-offs:

  • Speed: Tor is significantly slower than a VPN due to multi-hop routing.
  • Compatibility: Many websites block Tor exit nodes.
  • Use cases: Tor is better suited for anonymous browsing than streaming or torrenting.

Some advanced users combine Tor with a VPN — a setup sometimes called Tor over VPN (or Onion over VPN). In this configuration, your VPN hides your Tor usage from your ISP, while Tor protects your anonymity from the VPN provider. It's a powerful combination for high-risk privacy needs.

Practical Use Cases

  • Journalists and activists use Tor to communicate safely in countries with heavy censorship or surveillance.
  • Whistleblowers use SecureDrop, a Tor-based platform, to share sensitive documents with news organizations.
  • Privacy-conscious individuals use Tor to browse without being tracked or profiled by advertisers.
  • Researchers access the dark web — websites with .onion addresses only reachable through Tor — for legitimate investigative purposes.
  • Circumventing censorship: In countries where the open internet is restricted, Tor (especially with bridges and obfuscation tools) can bypass deep packet inspection.

The Bottom Line

Tor is one of the most robust anonymity tools ever created, but it's not a silver bullet. It's slower than a VPN, not ideal for all use cases, and exit nodes can be monitored if your traffic isn't also encrypted with HTTPS. Understanding Tor's strengths and limitations helps you build a smarter, layered approach to online privacy — whether that means using Tor alone, a VPN alone, or both together.