About Tor
This section explains Tor's design choices, security protections, entry guards, key management, and how Tor differs from other proxies.
Introduction
Security
How Tor works
Using and sharing
Alternate Designs
- You should make every Tor user be a relay
- You should transport all IP packets, not just TCP packets
- Exit policies should be able to block websites, not just IP addresses
- You should let the network pick the path, not the client.
- You should hide the list of Tor relays, so people can't block the exits.