Technical Architecture
Onion Routing
Encrypted Circuit Visualization
Client
Entry Guard
Relay
Exit Node
Advanced Security Protocols
Tor's software implements several key methods to protect identity beyond the network layer:
- Isolation: New circuit for every domain.
- Standardization: Blocks Canvas/WebRTC fingerprinting.
- No Script: Restricts high-risk JavaScript features.
Anti-Fingerprinting
Standardized browser attributes make all Tor users look identical to trackers, eliminating browser fingerprinting.
Decentralized Network
Traffic is bounced through thousands of volunteer-run relays worldwide to ensure no single entity controls the path.
Zero Knowledge Principle
Relays do not know both the origin and destination of the traffic simultaneously, maximizing user anonymity.