What is Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
Learn more about Tor »

Why Anonymity Matters

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.
Get involved with Tor »

Our Projects

Tails Logo

Tails

Live CD/USB operating system preconfigured to use Tor safely.

Orbot Icon

Orbot

Tor for Google Android devices.

TorBrowser Icon

Tor Browser

Tor Browser contains everything you need to safely browse the Internet.

Arm Icon

Arm

Terminal (command line) application for monitoring and configuring Tor.

Atlas Icon

Atlas

Site providing an overview of the Tor network.

Pluggable Transports Icon

Pluggable Transports

Pluggable transports help you circumvent censorship.

Stem Icon

Stem

Library for writing scripts and applications that interact with Tor.

Cloud Icon

Tor cloud

A user-friendly way of deploying bridges to help users access the uncensored Internet.

Learn more about our projects »

Recent Blog Posts

Possible upcoming attempts to di...

Fri, 19 Dec 2014

Posted by: arma

Tor Weekly News — December 17th,...

Wed, 17 Dec 2014

Posted by: harmony

Solidarity against online harass...

Thu, 11 Dec 2014

Posted by: arma

Tor Weekly News — December 10th,...

Wed, 10 Dec 2014

Posted by: harmony

Tor Browser 4.5-alpha-2 is released

Fri, 05 Dec 2014

Posted by: gk

View all blog posts »

Who Uses Tor?

Normal PeopleFamily & Friends

People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.

BusinessesBusinesses

Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.

Activists & WhistleblowersActivists

Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.

Journalists and the MediaMedia

Journalists and the media use Tor to protect their research and sources online.

Military and Law EnforcementMilitary & Law Enforcement

Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.