What is Tor Browser and how does it work?
Tor Browser is a privacy-focused web browser that routes your traffic through the Tor network, hiding your real IP address, preventing tracking, and protecting you against surveillance and censorship. Tor Browser uses the Tor network to protect your privacy and anonymity.
عن متصفّح تور (Tor)
Tor Browser is based on Mozilla Firefox ESR (Extended Support Release) but has been heavily modified for use with the Tor network. These modifications include additional patches and features that enhance privacy and security, making Tor Browser fundamentally different from Firefox or any other browser.
It is specifically developed to resist online tracking and browser fingerprinting, helping to prevent websites from identifying you based on your browser configuration. While it is technically possible to route other browsers through Tor, doing so exposes you to serious risks of deanonymization and information leakage. For this reason, we strongly discourage using Tor with any browser other than Tor Browser.
By default, Tor Browser does not keep any browsing history. Cookies are only valid for a single session (until Tor Browser is exited or a New Identity is requested). Learn more about the design of Tor Browser.
The Tor network
Using the Tor network has three main properties:
- لن يتمكن مزودك لخدمة الانترنت – أو أي شخص يراقب اتصالك محلياً – من تتبُّع نشاطك على الانترنت، بما في ذلك أسماء وعناوين مواقع الوِب التي تقوم بزيارتها.
- سيشاهد مشغلو المواقع والخدمات التي تستخدمونها وكل فرد يراقبهم، اتصالاً قادما من شبكة تور بدلا من عنوانك IP الحقيقي، ولن يتعرفوا عليك ما لم يتم التصريح بهويتك.
- Tor allows you to circumvent censorship by enabling access to websites and online services that may be restricted or blocked in your region.
How Tor works
إن تور (Tor) عبارة عن شبكة أنفاق افتراضية تتيح لك التحسين من مستوى خصوصيّتك وأمانك على الانترنت. يعمل تور عن طريق إرسال بياناتك عبر ثلاثة خوادم عشوائية (تُعرَف أيضًا باسم المُرحِّلات) داخل شبكة تور. بعد ذلك، يقوم آخِر مُرحِّل في المسار (مُرحِّل الخروج) بإرسال الحركات المرور إلى شبكة الانترنت العمومية. The image below illustrates a user browsing a website over Tor where the traffic goes over multiple hops or relays, represented by the slices of onion, and is encrypted and decrypted at each hop.
How Tor works