Join the thousands of Tor supporters building an internet powered by privacy. Make a donation today.
Through December 31, your gift will be matched 1:1, up to $300,000!
Chat with us live!
Tor prevents eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.
The following visualization shows what information is visible to eavesdroppers with and without Tor Browser and HTTPS encryption: