Get affordable services for your business

We provide services like, full stack web development, app development, no code websites, and many more.

Learn More

How TOR browser works?

#TOR#Browser

How does the TOR Browser Work?

Now-a-days people are moving to privacy browsers like TOR Browsers and Brave Browsers. But ever wondered, how TOR browser protects you against tracking, surveillance and censorship.

What is TOR?

TOR stand for The Onion Router is a network that enables a user to stay anonymous on the internet. The TOR network can be accessed using TOR Browser. Today millions of people use TOR for multiple purposes, everything from innocent daily browsing to illicit activities. It is also used to access the so-called "Dark Web".

What is Dark Web? Deep Web? and Surface Web?

  • Surface Web is a portion of web which can be searched or found on internet publicly. For example, visiting Facebook, Anything you search on Google, etc.
  • Deep Web is a opposite of surface web, the part of web which is not indexed or found publicly. For example, your GMail inbox, an unlisted YouTube video, online banking, or anything which is password or paywall protected can be considered as deep web. It's nothing like the dark web as most of us use the deep web all the time.
  • Dark Web is web content that exist on darknets/overlay networks and can only be accessed using specific software or authorization access.

Example Image:
Web Demo

Working of TOR Network

TOR uses the concept of "Onion Routing" method in which user data is first encrypted and then transferred through different TOR layers.

The TOR network has three layers/relays.

  • Entry Relay
  • Middle Relay
  • Exit Relay

The Entry Relay is the entry point to TOR Network. Each user will first connect to the Entry relay and will encrypt the data.
Middle Relay is getting data in the encrypted format and will pass the data to another middle relay. No middle node knows what data is passed except its predecessor and descendant. Even if the user employs the TOR network to do something illegal, the IP address of a middle relay will not show up as source traffic.
Exit Relay is the final relay that TOR traffic passes through before it reaches its destination. If a malicious user employs the Tor network to do something that might be objectionable or illegal, the exit relay may take the blame.

Example Image:
TOR Working Image


Is it illegal to use TOR?

Meme

The Tor browser has gained a bad reputation due to the increase in illegal activity on the dark web. However, using the TOR browser and TOR network is LEGAL unless you are doing illegal things on the dark web.

So, that's it for today guys!! Hope you learned something new. Till then...KEEP CODING...KEEP HUSTLING

Elon Musk

Contribute more than you consume.

Elon Musk

Founder of SpaceX and CEO of Twitter

Your website's ugly
Let us fix it.

Get a quote

Let's talk. We are looking forward to work with you and get back to you ASAP.

By submitting you agree our Privacy Policy.

Contact

Gigaweb

Making Internet Awwwesome