- DontGetGot.
- Posts
- The Onion Router - Browsing Anonymously
The Onion Router - Browsing Anonymously

Good Morning!
Continuing the topic of how to be anonymous on the web, we now will discuss TOR. No idea what TOR is? No worries, I got you.
Lets get into it..

What’s TOR ?
TOR, short for “The Onion Router”, is an open source network for browsing the internet while your traffic your is layered with multiple layers of encryption and your IP address is obscured. The Onion Router was developed by the US Government in the mid 1900’s as a way to securely communicate over the internet. Eventually the original code was released to the public under a free and open source license.
How does TOR work ?

The network works by relaying your traffic through a series of volunteer operated servers, known as “nodes” or “relays”. The first “relay” encrypts your data with multiple layers of encryption. The following relays un-encrypt the layers, one by one, until delivered to its final destination fully decrypted, akin to removing the layers of an onion.
TOR vs VPN
If you’re familiar with a VPN, you might ask yourself what’s the point of TOR. Why use one over the other.
Essentially The Onion Router and Virtual Private Networks do the same thing. They both encrypt your browsing traffic and conceal your IP. The difference is in the how. As I explained, the TOR network encrypts your traffic and bounces it across several nodes to hide the original IP. As for VPN’s, they work by encrypting your traffic from point to point, and routing your data through a VPN server to conceal your IP. The multiple hops on TOR slows down your internet connection considerably. The simplicity of a VPN allows for a faster web experience.
Drawbacks of TOR
TOR can be great for privacy and offers anonymity but there are serious drawbacks and limitations
Slow Connection Speeds: Because TOR routes your internet traffic through multiple relays, it can significantly slow down your connection speed.
Under Advanced Surveillance: While TOR provides a layer of anonymity, it is not foolproof against advanced surveillance techniques used by well-resourced organizations, such as government agencies or sophisticated cybercriminals. Techniques like reverse traffic analysis, timing attacks, and correlation attacks can be used to de-anonymize TOR users under certain circumstances.
Limited for Certain Activities: Some websites and online services actively block access from TOR exit nodes due to concerns about abuse, spam, or malicious activity. As a result, certain activities like accessing streaming services, making online purchases, or participating in some forums may be restricted or blocked when using TOR.

Overall, TOR can be a valuable tool for protecting privacy and circumventing censorship, but users should be aware of its limitations and potential risks when using the network.
We hope you enjoyed this mornings letter and found it valuable. Browse the internet safely and Don't Get Got!
P.S. Your experiences matter. If you've encountered a scam or hack and have insights to share, we invite you to connect with us. Let's build a community that stands against cyber threats.