The strongest single privacy tool — route traffic through multiple encrypted relays
How It Works
Tor routes your traffic through three encrypted relays (guard, middle, exit), making it extremely difficult to trace back to you. Unlike a VPN, no single relay knows both your identity and your destination.
The Tor Browser also standardizes your fingerprint — all Tor users report the same screen resolution, user agent, timezone, language, and other technical details. This makes it nearly impossible to distinguish one Tor user from another based on browser fingerprint.
What It Protects
IPv4 and IPv6 address — replaced with the exit relay's IP
Location, country, and coordinates — based on exit relay location
ISP, hostname, ASN — completely hidden behind Tor network
Browser and OS fingerprint — standardized across all Tor users
Screen resolution — reported as a common, rounded value
User agent — identical for all Tor Browser users
Timezone and language — set to UTC and en-US for all users
GPU, fonts, WebGL, canvas — fingerprint APIs are blocked or standardized
WebRTC — disabled entirely to prevent IP leaks
DNS requests — routed through Tor network
Limitations
Tor exit nodes are publicly listed, so websites can detect and block Tor traffic
Browsing through Tor is significantly slower than a VPN
Some websites require CAPTCHA verification or block Tor users entirely
Adding browser extensions or changing settings can break the fingerprint uniformity and make you more identifiable
Not suitable for bandwidth-heavy activities (streaming, large downloads)
Important: Do not install additional extensions or change default settings in Tor Browser. Every modification makes your browser more unique and easier to fingerprint, undermining the protection that comes from all Tor users looking identical.
Available Options
Tor Browser — the official browser developed and maintained by the Tor Project (torproject.org), a nonprofit organization dedicated to internet privacy and anonymity. It is built on Firefox ESR with all privacy settings pre-configured, fingerprint protection enabled by default, and NoScript included. It is the only browser that provides the full Tor anonymity guarantee.
Brave Tor mode — Brave browser includes a built-in "Private Window with Tor" feature for quick anonymous browsing. However, it differs from the full Tor Browser in several important ways:
Does not standardize your browser fingerprint — your screen resolution, fonts, GPU, and other parameters remain unique, making you distinguishable from other Tor users
Uses Brave's own Chromium-based engine instead of Firefox ESR, so the user agent and rendering behavior are different from the Tor Browser crowd
Does not include the same level of anti-fingerprinting protections (canvas, WebGL, AudioContext are not uniformly blocked)
Useful for casual IP hiding, but not recommended when strong anonymity is needed
Best combined with: For maximum protection, use the official Tor Browser on its own without additional extensions. If you need extra network-level security, you can combine Tor with a VPN (connect to VPN first, then open Tor), though this adds complexity and requires trusting your VPN provider.
How Tor Works in Detail
The Onion Routing Principle
Tor stands for "The Onion Router". The name comes from its layered encryption approach — like peeling layers of an onion. Your data is wrapped in three layers of encryption before it leaves your device. Each relay in the Tor circuit removes exactly one layer and forwards the data to the next relay. No single relay ever knows both who you are and what you're accessing.
The Tor Circuit
When you open the Tor Browser, it builds a circuit — a path through three relays selected from thousands of volunteer-operated servers worldwide. Each relay has a specific role:
Fingerprint Standardization
Unlike a VPN, which only hides your IP address, Tor Browser also makes your browser fingerprint identical to every other Tor user. This is critical — without it, websites could track you even though your IP changes with each circuit.
What Happens to Your Data at Each Step
Tor vs. VPN — Side by Side
Many people confuse Tor with a VPN. While both hide your IP address, they work very differently and provide different levels of protection.
Use a VPN when you need speed and want to hide your IP from websites, your ISP, or when accessing geo-restricted content. You trust a single provider.
Use Tor Browser when you need strong anonymity, want to prevent fingerprint tracking, and don't mind slower speeds. No single entity can link you to your activity.
Use both (VPN + Tor) when you don't want your ISP to know you're using Tor. Connect to the VPN first, then open Tor Browser.
Tip: You can use our homepage tool to verify your Tor connection. When using Tor Browser, you should see the exit relay's IP address, "Tor Exit Node" should be detected, and your fingerprint parameters should match the standardized Tor values.