The final relay decrypts the last layer and sends your request to the destination website. The website sees the exit node's IP address instead of yours. Key Benefits of Using Tor Five Years as an Exit Node Operator | The Tor Project
Tor operates on a principle known as . Unlike standard browsers that connect you directly to a website, Tor bounces your connection through three distinct layers of volunteer-run servers (relays):
Understanding Tor: The Layered Path to Online Privacy In an era where digital footprints are tracked and sold, Tor (The Onion Router) stands as a vital tool for reclaiming online freedom and privacy. Whether you are a journalist, an activist, or simply a privacy-conscious user, understanding how Tor works—and its limitations—is essential for staying safe. How Tor Works: The Onion Metaphor
This relay acts as a buffer, passing encrypted data between the entry and exit nodes. It knows neither the origin nor the destination of the traffic.
* May 8, 2026. RightsCon 26, Lusaka, Zambia. * June 14, 2025. W3PN Neo-Cypherpunk Summit. * June 23, Using Tor hidden services for good | The Tor Project
Your computer connects to this first relay, which sees your real IP address but cannot see what you are doing or where you are going.
Hi, Please don't spam in comments