
(Of course, traffic can be monitored at the exit node if you’re accessing an unencrypted website.) The exit node passes the traffic back along the relays, and the relays don’t know where it ends up. onion address, you’ll need to access it through the Tor Browser. The exit node talks to Google for you - from Google’s perspective, the exit node is accessing their website. The Tor relays pass your traffic along until it eventually reaches an exit node. Your Internet service provider and local network operator can’t see that you’re accessing - they just see encrypted Tor traffic. All traffic within the Tor network is encrypted.įor example, let’s say you access through Tor. Even the relays don’t know who requested the traffic they’re passing along. It also prevents the websites themselves from knowing your physical location or IP address - they’ll see the IP address and location of the exit node instead.

This prevents your Internet service provider and people monitoring your local network from viewing the websites you access. The traffic travels through several randomly selected relays (run by volunteers), before exiting the Tor network and arriving at your destination.

When you use a Tor client, your Internet traffic is routed through Tor’s network.
