
Tor (The Onion Router) is a free, open-source software that enables anonymous communication by directing internet traffic through a worldwide volunteer overlay network consisting of more than 7,000 relays.
ββββββββββββ βββββββββββββββ ββββββββββββββββ βββββββββββββββ ββββββββββββββββ
β User β βββ→ β Entry Guard β βββ→ β Middle Relay β βββ→ β Exit Relay β βββ→ β Destination β
β(You) β β (Node 1) β β (Node 2) β β (Node 3) β β (Website) β
ββββββββββββ βββββββββββββββ ββββββββββββββββ βββββββββββββββ ββββββββββββββββ
β β β β β
β β β β β
Your IP First Node Second Node Third Node Website sees
(Hidden) IP IP IP Exit Node IPNode Functions:
Entry Guard (First Node)
Middle Relay (Second Node)
Exit Relay (Third Node)
Tor uses onion routing - multiple layers of encryption like an onion:
Original Data
↓
[Encrypted for Exit Node]
↓
[Encrypted for Middle Relay]
↓
[Encrypted for Entry Guard]
↓
Transmitted through Tor networkEach node can only decrypt its own layer, revealing only the next hop.
Vulnerabilities:
Exit Node Monitoring
Traffic Correlation
Browser Fingerprinting
PGP provides cryptographic privacy and authentication for data communication. It uses a combination of:
Alice wants to send secure message to Bob
Step 1: Key Generation
βββββββββββ βββββββββββ
β Alice β β Bob β
β Generateβ β Generateβ
βKey Pair β βKey Pair β
β β β β
β Public β β Public β
β Private β β Private β
βββββββββββ βββββββββββ
Step 2: Public Key Exchange
βββββββββββ Public Key βββββββββββ
β Alice β ββββββββββββββ→ β Bob β
β β β β
β Bob's β ←ββββββββββββββ β Alice's β
β Public β Public Key β Public β
β Key β β Key β
βββββββββββ βββββββββββ
Step 3: Encryption & Transmission
βββββββββββ βββββββββββ
β Alice β β Bob β
β Message β β β
β ↓ β β ↓ β
β Encrypt β ββEncrypted Msgββ→β Decrypt β
βw/ Bob's β βw/ Bob's β
β Public β β Private β
β Key β β Key β
β ↓ β β ↓ β
β Ciphertextβ β Originalβ
βββββββββββ βββββββββββPublic Key:
Private Key:
Scenario: Journalist wants to receive anonymous tips
1. Journalist publishes their PUBLIC KEY on website
2. Source encrypts message using journalist's PUBLIC KEY
3. Source sends encrypted message over any channel (email, Tor, etc.)
4. Even if intercepted, message cannot be read without PRIVATE KEY
5. Journalist decrypts with their PRIVATE KEY
6. Only journalist can read the original messageCommon Applications:
Email Encryption
Market Communications
File Encryption
Features:
- All website features enabled
- JavaScript allowed everywhere
- Media auto-plays
- Performance optimizations enabled
Best for: General browsing when convenience is priorityFeatures:
- JavaScript disabled on non-HTTPS sites
- HTML5 media click-to-play
- Some font rendering disabled
- Performance optimizations reduced
Best for: Balanced security and usabilityFeatures:
- JavaScript disabled everywhere
- All media click-to-play
- Maximum security settings
- May break some sites
Best for: Maximum anonymity and securityPurpose: Hide hardware identifier of network card
How to Enable (Tails OS):
Benefits:
INTERNET
β
βββββββββββββββΌβββββββββββββ
β β β
ββββββΌβββββ ββββββΌβββββ βββββΌβββββ
β Google β β Regular β β Deep β
β Search β β Sites β β Sites β
β (Clear) β β (Clear) β β (Tor) β
βββββββββββ βββββββββββ βββββ¬βββββ
β
ββββββββββββ΄βββββββββββ
β β
βββββββΌββββββ βββββΌβββββ
β Hidden β β Public β
β Services β β Forums β
β ("onion") β β("onion")β
βββββββββββββ ββββββββββ
Access Path:
Clear Web: User → ISP → Website
Deep Web: User → Tor → Website
Dark Web: User → Tor → "onion" Site| Term | Definition |
|---|---|
| Node | Server in Tor network that relays traffic |
| Relay | Another term for Tor node |
| Circuit | Complete path through Tor network (3 nodes) |
| Onion Site | Website with “onion” domain, only accessible via Tor |
| Exit Node | Final node that connects to destination |
| Entry Guard | First Tor node you connect to |
| Bridge | Hidden Tor entry point (censorship circumvention) |
| PGP Key | Cryptographic key pair for encryption |
| Fingerprint | Unique identifier for a PGP key |
| MAC Address | Hardware identifier for network interface |
Keep Tor Browser Updated
Verify PGP Keys
Disable Unnecessary Features
Use Bridges in Restrictive Countries
Separate Identities