Elias David
Cybersecurity researcher and digital privacy advocate. Spent a decade navigating the unindexed corners of the internet with a background in network infrastructure and a passion for digital rights.
Published: March 13, 2026 | 12 min read | Last updated: March 13, 2026
Total Invisibility: The Truth About the Tor Network
7 Wonders of Cyberspace — Entry #3
Every click you make online leaves a trace. Your ISP logs it. Ad networks record it. Government surveillance programs catalog it. The Tor network formally known as The Onion Router was built to make that trail invisible. What started as a classified U.S. Naval Research project in the mid-1990s has evolved into the world's most widely used anonymous communication network, with nearly 2 million daily users routing their traffic through a labyrinth of volunteer-run servers to vanish from the digital record. But Tor carries a reputation as sinister as it is misunderstood. Is it a lifeline for dissidents, journalists, and whistleblowers or a criminal underground? The answer, like the network itself, has layers.
⚡ Quick Answer
The Tor network anonymizes internet traffic by encrypting data in multiple layers and routing it through three volunteer-run relays worldwide. No single relay sees both the sender and destination simultaneously. It is legal in most countries and used primarily for privacy not crime. Born in a Navy Lab: The Surprising Origins of Tor
Here is a fact that scrambles most people's assumptions: the most powerful privacy tool on the internet was invented by the United States government to protect its own intelligence operations.
In 1995, three researchers at the U.S. Naval Research Laboratory mathematician Paul Syverson and computer scientists Michael Reed and David Goldschlag confronted a fundamental problem. Intelligence agents communicating online were leaving fingerprints. Even encrypted traffic could be traced back to its source through traffic analysis: observe who's connecting to whom, at what time, and how much data flows, and you can map a spy network without reading a single byte.
Their solution was to route communications through a chain of intermediary computers, each knowing only the identity of its neighbors never the full path. They called this technique onion routing, because data would be wrapped in concentric encryption layers like the skin of an onion. The Tor Project's own historical account confirms that the first prototypes were deployed in the late 1990s, initially on Sun Solaris machines.
The project became publicly available in 2002 when MIT graduates Roger Dingledine and Nick Mathewson joined Syverson to develop what they formally named Tor The Onion Routing. In 2004, the Naval Research Laboratory released the code under a free license. In 2006, Dingledine, Mathewson, and five others formally incorporated The Tor Project as a 501(c)(3) nonprofit based in Massachusetts.
📊 Key Stat: As of its inception, 80% of The Tor Project's early $2M annual budget came from the U.S. government, including the State Department and National Science Foundation — a paradox that underscores how broad the legitimate demand for anonymous communication really is.
The project's early funders made for unlikely bedfellows: the U.S. State Department, the Electronic Frontier Foundation, Human Rights Watch, Google, and the University of Cambridge all contributed. As Dingledine himself explained at an early privacy conference: the title of his talk was "What do the EFF and the Department of Defense have in common?" and the answer was that both were funding Tor. That coalition, he argued, was the point. An anonymity network only protects individuals when its user base is diverse enough that no one can guess why any particular person is using it.
How Onion Routing Actually Works
The metaphor is effective precisely because it's accurate. When you send a message through Tor, that message is wrapped in three independent layers of encryption — one for each relay node your data will pass through. Think of it like sealing a letter inside three envelopes, each addressed only to the next post office on the chain. Nobody at any single post office can see both where the letter originated and where it's ultimately going.
The Three-Node Circuit
Every Tor connection travels through exactly three relay nodes, each serving a distinct role:
- Guard Node (Entry Relay): The first stop. This relay knows your real IP address but it cannot see your destination. It strips the outermost layer of encryption and passes the data forward, knowing only the identity of the next node.
- Middle Node: The anonymizing layer. This relay knows neither where the data came from originally, nor where it is ultimately heading. It simply peels another encryption layer and hands off to the exit node.
- Exit Node: The last relay. This node decrypts the final layer and delivers your request to the destination server. The website sees the exit node's IP address not yours. However, the exit node itself can see unencrypted traffic if you are not using HTTPS, which is a critical limitation discussed below.
The Tor client on your device handles all of this automatically. Before your data leaves your machine, it has already been encrypted with the public keys of all three relays in sequence. As NYU's ITP Networks Lab explains, only your device holds all three decryption keys simultaneously individual relay operators never do. The result is that no single point in the network can observe both your identity and your activity at the same time.
💡 Pro Tip: Always use HTTPS sites when browsing through Tor. The exit node can see unencrypted data. With HTTPS, even the exit node only sees an encrypted payload it knows you visited a site, but not what you did there. The Tor Browser enforces HTTPS-Only mode by default since version 11.
Onion Services: The Hidden Web Within Tor
Standard Tor usage routes traffic to regular websites Google, the BBC, Reddit through the three-node circuit. But Tor also supports a second model: onion services (formerly called hidden services). These are servers that exist exclusively within the Tor network, accessible only via special .onion addresses. Their IP addresses are never exposed, even to the Tor network itself.
When an onion service is set up, it registers its public cryptographic key with a set of "introduction points" inside the network. A client wanting to connect proposes a "rendezvous point" a relay both parties agree to meet at and the entire exchange happens without either the client or server ever revealing their true location to the other. This is how The New York Times, The Washington Post, and The Guardian operate their SecureDrop whistleblower submission systems and why they work.
Who Really Uses Tor in 2026?
The gap between Tor's reputation and its actual user base is cavernous. Popular imagination places Tor at the center of drug markets and hacker forums. The data tells a different story.
📊 Key Stat: As of July 2025, approximately 2 million people use Tor daily, routing traffic through around 8,000 active volunteer-run relays. The United States accounts for roughly 18% of direct connections, with Germany and Finland close behind.
Roger Dingledine, the co-founder of the Tor Project, has addressed this misconception head-on at security conferences. At DEF CON, he stated plainly that only about 3% of Tor users connect to hidden services at all and of those, a significant portion access entirely legitimate platforms. The most visited destination on the Tor network for years was not a drug market. It was Facebook, accessed by over a million people monthly in countries like Iran and China where the social network is blocked.
The real Tor user profile in 2026 looks something like this:
- Journalists and sources: Organizations including The New York Times, The Guardian, and Der Spiegel operate SecureDrop portals via .onion addresses to protect whistleblowers.
- Activists and dissidents: Tor usage spiked in Iran following the 2022 and 2026 protests. Citizens in Russia, China, and Belarus use it to access censored news and organize.
- Cybersecurity professionals: Researchers use Tor to conduct threat intelligence work without alerting targets.
- Privacy-conscious everyday users: People who simply do not want their ISP, employer, or ad networks tracking their browsing. No illegal intent required.
- Law enforcement: Intelligence agencies use Tor to surveil targets without revealing government IP addresses the same anonymity tool used by those they pursue.
In my experience conducting threat intelligence research, Tor is less a gateway to criminal activity and more a structured inconvenience one that the overwhelming majority of its users accept in exchange for genuine privacy. I have watched colleagues abandon VPNs after discovering that many log traffic regardless of their policies. With Tor, the distributed trust model means no single operator can build a complete picture. When I have traced activity through the network for academic purposes, the circuit-churning, the latency, and the encryption overhead all serve as a constant reminder that this system was engineered with paranoia as a design goal and that, for the people who need it most, is exactly the point.
The Dark Web: What It Is and What It Isn't
Terminology matters here. Three terms get conflated constantly — and each one means something distinct.
| Term | What It Actually Means | Requires Tor? |
|---|---|---|
| Surface Web | Everything indexed by search engines — Google, Wikipedia, news sites | No |
| Deep Web | Everything behind login walls — your bank, email, Netflix library. Huge and almost entirely benign. | No |
| Dark Web | Sites accessible only via specialized networks like Tor, using .onion addresses. A small fraction of Tor traffic. | Yes (for .onion sites) |
The Tor network hosts over 65,000 unique .onion addresses, according to Tor Metrics data cited by SQ Magazine. Of these, research suggests roughly 55% host legal content. That still leaves a meaningful percentage drug markets, stolen credential exchanges, extremist forums that give Tor its dark reputation. The illegal activity is real. The claim that it defines the network is not.
What often goes unreported is how effectively law enforcement has penetrated dark web markets. Operation Onymous in 2014, the takedown of AlphaBay and Hansa in 2017, and numerous subsequent operations demonstrate that Tor does not guarantee impunity particularly when users make operational security mistakes on their end. Tor protects your IP address. It cannot protect you from logging into your personal email from a Tor session, or from getting caught at a physical mailbox.
"Anonymity isn't encryption. Using encryption is good, but someone watching your traffic can learn who you're talking to, when you're talking to them, how much — and that's all of the interesting details."
Where Tor Falls Short: Real Limitations and Risks
Tor is powerful. It is not invincible. Understanding its failure modes is as important as understanding its design especially if you are relying on it for genuine protection.
Traffic Correlation Attacks
Tor's most serious theoretical weakness is the global passive adversary an entity that can monitor both the entry and exit of the Tor circuit simultaneously. By correlating the timing, size, and frequency of packets entering and leaving the network, such an adversary can statistically link a user to their destination even without breaking the encryption. This is acknowledged by the Tor Project itself. NSA documents leaked by Edward Snowden confirmed that GCHQ described Tor as "the king of high security low latency internet anonymity" but also confirmed active research into correlation-based deanonymization.
Exit Node Risks
The exit node decrypts the final encryption layer to deliver traffic to its destination. Anyone running a malicious exit node can read unencrypted traffic. Research has consistently found rogue exit nodes operated by intelligence agencies and opportunistic attackers. Academic work cited by Wikipedia notes that Swedish researcher Dan Egerstad once collected passwords from over 100 embassy email accounts using a compromised exit node.
Browser Fingerprinting and Human Error
Tor protects your IP. It cannot protect you from logging into an account linked to your real identity, enabling browser plugins, or using full-screen mode (which reveals your screen resolution and contributes to fingerprinting). The Tor Browser's strict defaults exist for these reasons changing them undermines the entire architecture.
⚠️ Important: Never log into personal accounts Google, social media, email while using Tor for anonymity. The moment you authenticate, the site knows who you are, regardless of what IP address you are using. Tor protects metadata, not identity context you volunteer.
Tor vs. VPN: An Honest Comparison
Both tools obscure your IP address from destination websites. Beyond that, their architectures differ fundamentally and the right choice depends entirely on your threat model.
| Feature | Tor Network | VPN |
|---|---|---|
| Operator trust required? | No — distributed across 8,000+ volunteers | Yes — single company holds all logs |
| Speed | Slow (3 hops + encryption overhead) | Fast (single server hop) |
| Cost | Free | Paid (typically $3–$15/month) |
| Anonymity from ISP? | Yes — ISP sees only Tor entry node | Yes — ISP sees VPN server IP |
| Access to .onion sites | Yes | No (unless Onion-over-VPN feature) |
| Protection from global surveillance | Strong (but not absolute) | Moderate (provider can be compelled) |
The key distinction: a VPN concentrates trust in one entity. Tor distributes it across thousands of volunteers you will never identify. For high-stakes anonymity journalists communicating with sources under authoritarian governments, for example Tor's architecture provides protections a VPN structurally cannot match. For everyday users who want speed and simply want their ISP to stop logging their browsing, a reputable no-log VPN is often the more practical choice.
Frequently Asked Questions
What is the Tor network used for?
Tor is used for anonymous internet browsing, bypassing government censorship, whistleblowing, and secure journalism. Most users are privacy-conscious individuals, activists, and journalists not criminals. Only an estimated 3% of users access hidden services, and of those, many are entirely legal platforms.
Is using Tor illegal?
In most countries, using Tor is completely legal. It is an open-source tool endorsed by the Electronic Frontier Foundation and used by governments, NGOs, and journalists. It is blocked or restricted in authoritarian countries like China and Russia. Using Tor to commit crimes is illegal but the tool itself is not.
Can Tor be traced by police?
Tor significantly complicates tracking, but it is not foolproof. Law enforcement has successfully deanonymized Tor users through traffic correlation analysis, malware exploits, and most commonly human operational security mistakes. Tor does not protect users who log into personal accounts or reveal identifying information while browsing.
Is Tor safer than a VPN?
For high-stakes anonymity, Tor is generally stronger because no single operator holds your complete traffic record. VPNs concentrate trust in one company, which can be compelled to produce logs. However, VPNs are faster, easier to use, and sufficient for most everyday privacy needs.
What is a .onion site?
A .onion site is a web address that only works through the Tor browser. These sites hide their server location using cryptographic identifiers rather than IP addresses. They include both legitimate services whistleblowing platforms, private communication tools, censorship-resistant news outlets and illegal marketplaces.
Does Tor hide you from your ISP?
Yes your ISP can see that you are connecting to the Tor network, but cannot see the destination of your traffic or its content. This is a key protection. However, if you want to hide the fact that you are using Tor at all, Tor bridges and obfuscation tools like obfs4 can mask even this connection pattern.
The Bigger Picture
Tor is not a villain's tool. It is infrastructure like encrypted email or HTTPS that is neutral by design and valuable precisely because it works for everyone equally. The Iranian dissident, the investigative journalist, the data scientist who doesn't want Google profiling her research, and yes, the criminal on a dark web market all share the same network. That is not a bug. As Dingledine has argued for decades, a network used only by criminals would immediately identify all its users as criminals.
What Tor represents technically and philosophically is a refusal to accept that surveillance is the default state of the internet. Nearly 30 years after three Navy researchers asked a simple question about communication privacy, that refusal still powers 2 million anonymous connections every day. The onion keeps growing.
📚 Sources & References
- The History of Tor — The Tor Project (Official)
- Tor (network) — Wikipedia
- Onion Routing — Wikipedia
- Tor Statistics 2026 — SQ Magazine
- Tor Statistics — ElectroIQ, 2025
- Demystifying the Dark Web — NYU ITP Networks Lab
- Roger Dingledine at CyberSec&AI Connected 2020 — Gen Digital Newsroom
- Interview with Roger Dingledine — CloudFest 2025
- SecureDrop — Freedom of the Press Foundation
- What is Onion Routing? — NordVPN Blog



























































