HTTPS

The short answer is: Yes, you can browse normal HTTPS Sites using Tor.

HTTPS Connections are used to secure communications over computer networks. You can read more about HTTPS here Tor Browser has the HTTPS Everywhere plugin which automatically switches thousands of sites from unencrypted "HTTP" to more private "HTTPS".

Cuireann Tor cosc ar chúléisteoirí na suímh a dtugann tú cuairt orthu a fheiceáil. Mar sin féin, nuair a sheolann tú faisnéis neamhchriptithe trasna an Idirlín thar HTTP, is féidir le hoibreoirí an athsheachadáin amach, nó le haon duine atá ag féachaint ar an trácht idir an athsheachadán amach agus an suíomh Gréasáin, an trácht sin a fheiceáil. Nuair a thugann tú cuairt ar shuíomh HTTPS, bíonn an trácht a fhágann an t-athsheachadán amach criptithe sa chaoi nach mbeadh cúléisteoir in ann é a léamh.

This visualization shows what information is visible to eavesdroppers with and without Tor Browser and HTTPS encryption.

The following visualization shows what information is visible to eavesdroppers with and without Tor Browser and HTTPS encryption:

  • Click the “Tor” button to see what data is visible to observers when you're using Tor. The button will turn green to indicate that Tor is on.
  • Click the “HTTPS” button to see what data is visible to observers when you're using HTTPS. The button will turn green to indicate that HTTPS is on.
  • When both buttons are green, you see the data that is visible to observers when you are using both tools.
  • When both buttons are grey, you see the data that is visible to observers when you don't use either tool.



POTENTIALLY VISIBLE DATA
Site.com
The site being visited.
user / pw
Username and password used for authentication.
data
Data being transmitted.
location
Network location of the computer used to visit the website (the public IP address).
Tor
Whether or not Tor is being used.