The Civic Security Guide

A comprehensive resource for activists, protesters, and community organizers.

View the Project on GitHub lumpencamp/civic-security

A Guide to the Tor Browser: Your Gateway to Anonymity

What is the Tor Browser?

The Tor Browser is a free and open-source web browser designed to protect your anonymity online. It’s your most powerful tool for browsing the internet without revealing your true location or identity. It is developed and maintained by the Tor Project, a non-profit organization dedicated to advancing human rights and freedoms by creating and deploying free and open source anonymity and privacy technologies.

When you use a regular browser (like Chrome, Firefox, or Safari), your internet traffic travels directly from your device to the website you’re visiting. This means the website, your Internet Service Provider (ISP), and any network observers can see who you are and what you’re looking at. The Tor Browser changes this dynamic completely.

How Does It Work? The Magic of Onion Routing

Tor protects you using a technique called “onion routing.” It’s a clever process that’s easier to understand with an analogy.

Imagine you want to send a secret message to a friend. Instead of sending it directly, you do the following:

  1. You take your message, put it in a small box, and write your friend’s address on it.
  2. You then put that small box inside a slightly larger box and address it to a random person, let’s call them Person A.
  3. You then put that box inside an even larger box and address it to another random person, Person B.

When Person B receives the largest box, they open it and find the box addressed to Person A. They forward it along. Person A receives their box, opens it, and finds the final box addressed to your friend. They send it to its final destination.

This is how Tor works. Your internet traffic is wrapped in multiple layers of encryption, like the layers of an onion:

This multi-layered, randomized path makes it extremely difficult for anyone to trace your internet activity back to you.

When Should You Use the Tor Browser?

Critical Limitations: What Tor Does NOT Do

Understanding Tor’s limitations is essential for using it safely.

  1. The Exit Node is a Point of Weakness: The traffic leaving the final computer (the Exit Node) and going to the website is no longer encrypted by Tor. If the website you are visiting does not use HTTPS (the little lock icon in the address bar), then the person running the Exit Node can see your traffic. Always ensure you are connecting to HTTPS websites when using Tor.

  2. Tor Does Not Make You Invincible: Tor anonymizes your connection, but it doesn’t protect you from your own actions. If you log into an account (like Facebook or your email) using Tor, you have just told that service exactly who you are. For true anonymity, do not log into personal accounts.

  3. It Can Be Slow: Because your traffic is bouncing around the world, using Tor is noticeably slower than a regular browser. It’s not ideal for streaming video or downloading large files.

  4. It Doesn’t Protect Your Entire Computer: The Tor Browser only protects the traffic that goes through the browser itself. It does not anonymize the activity of other applications on your computer.


The Tor Browser is a cornerstone of digital privacy. By understanding how it works and its limitations, you can use it effectively to protect your identity and explore the internet with confidence.