What is Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
Learn more about Tor »

Why Anonymity Matters

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.
Get involved with Tor »

Our Projects

TorBrowser Icon

Tor Browser

Tor Browser contains everything you need to safely browse the Internet.

Orbot Icon


Tor for Google Android devices.

Tails Logo


Live CD/USB operating system preconfigured to use Tor safely.

Arm Icon


Terminal (command line) application for monitoring and configuring Tor.

Atlas Icon


Site providing an overview of the Tor network.

Pluggable Transports Icon

Pluggable Transports

Pluggable transports help you circumvent censorship.

Stem Icon


Library for writing scripts and applications that interact with Tor.



Global observatory monitoring for network censorship.

Learn more about our projects »

Recent Blog Posts

Mission: Montreal! (Building the...

Wed, 25 May 2016

Posted by: nickm

Mid-2016 Tor bug retrospective, ...

Mon, 23 May 2016

Posted by: art

The Tor Project is Hiring a Deve...

Tue, 17 May 2016

Posted by: isabela

Tracking The Impact of the Whats...

Mon, 16 May 2016

Posted by: atagar

GSoC 2016 Projects

Sat, 07 May 2016

Posted by: boklm

View all blog posts »

Who Uses Tor?

Normal PeopleFamily & Friends

People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.


Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.

Activists & WhistleblowersActivists

Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.

Journalists and the MediaMedia

Journalists and the media use Tor to protect their research and sources online.

Military and Law EnforcementMilitary & Law Enforcement

Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.