
Similarly, servers in the Internet just see that they are being contacted by Tor nodes.

Note that all your local ISP can observe now is that you are communicating with Tor nodes. More details on this process can be found in this visualization. Your communication is encrypted in multiple layers and routed via multiple hops through the Tor network to the final receiver. The aim of Tor is to improve your privacy by sending your traffic through a series of proxies. In addition, every server in the Internet that can see any of the packets can profile your behavior. In particular, your local ISP is in the position to build a complete profile of your Internet usage. Thus, every router between sender and receiver learns that the sender is communicating with the receiver. The way from sender to receiver involves multiple hops of routers, where each router inspects the destination IP address and forwards the packet closer to its destination. Internet communication is based on a store-and-forward model that can be understood in analogy to postal mail: Data is transmitted in blocks called IP datagrams or packets.Įvery packet includes a source IP address (of the sender) and a destination IP address (of the receiver), just as ordinary letters contain postal addresses of sender and receiver.
