TOR: Privacy, Anonymity & Security

Tor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server.


The Tor network is based on a low-latency onion-routing design, where traffic is forwarded through randomly selected , wrapping data in multiple layers of encryption (onion skins) to maintain unlinkability . An is also called a relay.

How Tor Works?

TOR Diagram
TOR Diagram

The way how TOR protects your identity is that the source IP addresses are not stored in the data transferred. TOR only stores the destination address and the IP address of the node that last processed the data. So there is no way hackers can find your original IP address.

TOR works by encrypting the destination IP address. The source IP is not stored, only the IP address of the previous node used in the Tor network is stored. So, it is nearly impossible to tell where the data is originated from.

There are thousands of TOR relays on the Tor network. When Tor sends data, it randomly selects one relay to communicate. The next relay then picks the next relay, and so on. In order for private communication between the two relays, they exchange encryption keys.

TOR Browser is just a modified version of Firefox Browser.

Should you use TOR?

With great power comes great responsibility

There is no doubt that TOR is a powerful tool, which can be used for good or evil, but it’s not for everyone(I am referring to Script Kiddies) and shouldn’t be wrongly used. Do not use TOR unless you absolutely need it, and always make sure that you understand what you are doing, so you don’t make things go wrong. Else:

Advantages and Disadvantages of Tor


  • You can access dark web websites.
  • Free to use.
  • Helps you to stay anonymous.
  • Leak sensitive data safely. (VmlhbmV0IENvbW11bmljYXRpb24K)


  • Tor is also used for lots of illegal activities.
  • Malware everywhere.
  • Exit Node MITM
  • One mistake, Life Prison.

Installing Tor

$ sudo apt-get update

$ sudo apt-get install tor torbrowser-launcher -y

installing tor and browser

Tor for Android

Is TOR really safe to use?

“They are actively trying to break the encryption used by Tor" -Edward Snowden.

TOR has various flaws that an attacker or three-letter agencies can take advantage of and target particular people or certain services. Let’s talk about some flaws of TOR:

Flaws Of Tor

1. Exit Node MITM

Mr. Robot MITM in Exit Node

2. Distributed Denial Of Service

TOR nodes especially exit nodes have been targeted many times with this attack. Attacker groups or large Government entities can attack sites or nodes to make all nodes unavailable. So far this scenario has not happened. This attack is more dangerous when the attack is performed using the 0-day vulnerability.

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

3. Device Fingerprinting

Fingerprinting Attack on the Tor Anonymity System

Browser Fingerprinting: An Introduction and the Challenges Ahead

I just got lucky. He answered my question lol

4. DNS Leak

DNS Leak Test

5. Correlation Attacks

Correlation Attacks on TOR


Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.

TOR is powerful as well as risky. Always make sure that you understand what you are doing.

I am in no way an expert user of TOR and this article is completely based on my personal research and may not be 100% correct. That’s it for today’s post. More about the Dark Web, TOR, and much more will be covered in the next article. Use TOR responsibly. Don’t be a jerk.

Hola! They call me Hacker