Tor: How it works


Basic Tor overview: what Tor provides, why it matters, how it works.

Installing, configuring, and running Tor.

The design document (published at Usenix Security 2004) gives our justifications and security analysis for the Tor design:

Our follow-up paper on challenges in low-latency anonymity (still in draft form) details more recent experiences and directions: PDF version.

The specification aims to give developers enough information to build a compatible version of Tor:

Look at the slides from the 21C3 talk, and listen to the audio from the talk.

Webmaster - $Id$