What is Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
Learn more about Tor »

Why Anonymity Matters

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.
Get involved with Tor »

Our Projects

TorBrowser Icon

Tor Browser

Tor Browser contains everything you need to safely browse the Internet.

Orbot Icon


Tor for Google Android devices.

Tails Logo


Live CD/USB operating system preconfigured to use Tor safely.

Arm Icon


Terminal (command line) application for monitoring and configuring Tor.

Atlas Icon


Site providing an overview of the Tor network.

Pluggable Transports Icon

Pluggable Transports

Pluggable transports help you circumvent censorship.

Stem Icon


Library for writing scripts and applications that interact with Tor.



Global observatory monitoring for network censorship.

Learn more about our projects »

Recent Blog Posts

Tor is released and stable

Mon, 23 Nov 2015

Posted by: nickm

Nine Questions about Hidden Serv...

Mon, 16 Nov 2015

Posted by: ailanthus

Did the FBI Pay a University to ...

Wed, 11 Nov 2015

Posted by: arma

Ethical Tor Research: Guidelines

Wed, 11 Nov 2015

Posted by: ailanthus

Tor Browser 5.5a4-hardened is re...

Thu, 05 Nov 2015

Posted by: gk

View all blog posts »

Who Uses Tor?

Normal PeopleFamily & Friends

People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.


Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.

Activists & WhistleblowersActivists

Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.

Journalists and the MediaMedia

Journalists and the media use Tor to protect their research and sources online.

Military and Law EnforcementMilitary & Law Enforcement

Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.