
Tor won't encrypt your data-for that, you'll need a Virtual Private Network (VPN).

The Tor Project (Opens in a new window) has a page listing many examples of legitimate types of Tor users, such as political dissidents in countries with tight control over the Internet and individuals concerned about personal privacy. The Tor Project non-profit receives sizeable donations from various federal entities such as The National Science Foundation. If you're thinking that Tor comes from a sketchy group of hackers, know that its core technology was developed by the U.S. Tor Browser manages to simplify the process of protecting your identity online-but at the price of performance. Accessing Tor has long been beyond the ability of the average user. Using this Web browser also hides your location, IP address, and other identifying data from regular websites. The most common way to view the so-called Dark Web that comprises Tor sites is by using the Tor Browser, a modded version of Mozilla Firefox. Tor, which stands for "The Onion Router" is not a product, but a protocol that lets you hide your Web browsing as though it were obscured by the many layers of an onion. Need to hire an assassin, buy some contraband, view illegal porn, or just bypass government, corporate, or identity thief snooping? Tor is your answer.

Individuals Also Use Tor For Socially Sensitive Communication: Chat Rooms And Web Forums For Rape And Abuse Survivors, Or People With Illnesses. Tor's Hidden Services Let Users Publish Web Sites And Other Services Without Needing To Reveal The Location Of The Site. Individuals Use Tor To Keep Websites From Tracking Them And Their Family Members, Or To Connect To News Sites, Instant Messaging Services, Or The Like When These Are Blocked By Their Local Internet Providers.

Tor Provides The Foundation For A Range Of Applications That Allow Organizations And Individuals To Share Information Over Public Networks Without Compromising Their Privacy.

It Also Enables Software Developers To Create New Communication Tools With Built-in Privacy Features. Tor Is A Network Of Virtual Tunnels That Allows People And Groups To Improve Their Privacy And Security On The Internet.
