Tor Browser is a modified version of Mozilla Firefox Extended Support Release (ESR) designed to route all traffic through the Tor (The Onion Router) network. Its primary purpose is to anonymize the user’s IP address and prevent surveillance by isolating browser sessions.
Table of contents
Open Table of contents
Privacy & Security Audit
Tor Browser implements a defense-in-depth strategy. It does not merely hide the IP; it actively strips identifying data and prevents linkability between browsing sessions.
Telemetry & Data
- Collection: Tor Browser sends zero data to the developers. It disables Mozilla telemetry, crash reporters, and health reports entirely.
- Fingerprinting Resistance: The browser enforces a uniform screen resolution (1000x1000 on desktop), generic fonts, and a fixed User-Agent string. This makes your browser look identical to every other Tor Browser user, reducing the effectiveness of device fingerprinting.
- Local Data Storage: Cookies, temporary files, and history are purged automatically when the session ends. HTTPS-Only mode is forced by default to prevent SSL stripping.
Cryptography
- In-Transit: Traffic is encrypted three times (hence the “Onion” analogy) as it passes through the Tor relay network. Each relay only knows the immediate predecessor and the next hop, decrypting one layer at a time.
- Standards: Tor uses TLS 1.3 for circuits. For onion services (
.onionaddresses), it utilizes advanced cryptographic protocols like v3 onion services, which use Ed25519 keys for stronger identity protection and single onion services.
Source Code & Auditing
- License: Distributed under the Mozilla Public License 2.0 (MPL-2.0), based on Firefox ESR.
- Transparency: The codebase is fully open-source. Unlike standard Firefox, Tor Browser includes specific patches for privacy, such as the “NoScript” and “HTTPS-Only” extensions pre-configured with strict defaults.
- Audits: The code undergoes regular security audits by third-party organizations and researchers funded by the Tor Project.
Identity
- Authentication: No account, email, or phone number is required to use the browser.
- Anonymity: The system is anonymous by design. The entry node sees your IP, but not your destination. The exit node sees the destination, but not your IP. The middle node sees neither.
- Bridge Relays: For users in censored regions, Tor uses “Pluggable Transports” (e.g., obfs4) to disguise Tor traffic as normal HTTPS traffic, bypassing Deep Packet Inspection (DPI).
Usability
Tor Browser is user-friendly regarding the interface (it looks like Firefox), but the browsing experience is inherently slower due to the routing of traffic through three global relays.
- Speed: Latency is noticeable, making real-time gaming or HD streaming impossible.
- CAPTCHAs: Major websites (like Google and Cloudflare-protected sites) frequently flag Tor exit nodes, forcing users to solve multiple CAPTCHAs.
- Blocking: Some websites block Tor exit nodes outright.
Pros
- True Anonymity: Hides the source IP address from the destination website.
- Censorship Circumvention: Bypasses government firewalls and geo-restrictions effectively.
- Hardened Security: Comes pre-configured with NoScript to block active content (Java, Flash) which can execute code and deanonymize users.
- No-Logging Policy: The Tor network relays do not keep logs of traffic passing through them, preserving deniability.
- Free and Open Source: Maintained by the non-profit Tor Project without commercial data mining.
Cons
- Performance: Speed is significantly reduced due to multi-hop routing.
- Limited Functionality: Websites requiring WebRTC or unprotected WebSockets may break due to strict security settings.
- Scrutiny: Using Tor can attract unwanted attention from ISPs or government agencies in authoritarian regimes, despite the encryption.
- Exit Node Risks: While the connection is encrypted to the destination, the exit node can see unencrypted traffic (e.g., HTTP sites).
- Usability Issues: Captchas and blocked sites are frequent annoyances.
Verdict
Tor Browser is the standard for online anonymity. Its cryptographic implementation and network design are robust and field-tested. While the performance penalties and CAPTCHAs make it unsuitable as a daily driver for the average user, it is essential for journalists, activists, and privacy-conscious users who require uncompromised anonymity. Always pair it with HTTPS-Only mode to protect data from malicious exit nodes.
Resources & Links
- Official Website: Tor Project
- Download Page: Get Tor Browser
- Documentation: Tor Manual
- Source Code: Tor Browser Repository
- Support: Tor Community Portal