4 Most Common Myths About Tor You Should Learn About

Tor has become such a popular application in online anonymity circles that people have been using its name mistakenly to refer to the concept it operates under (onion routing). What it is, how it works, and what it can do is still mostly unclear to most people who use it on a daily basis which often leads to complacency based on certain slight misconceptions about its mechanism. Although using onion routing offers several advantages, it’s important to note what its limitations are. Understanding the risks associated with Tor can help you better protect yourself from measures that would compromise your privacy.

Myth 1: Tor Is Unsafe Because It Was Developed by the U.S. Government


I cannot contradict the notion that onion routing was developed by the U.S. Navy and State Department because, well, it was. Because of this, there is a notion that suspects it may include a backdoor that allows the government to tune in and remove the veil that is put in front of all the communication you participate in. Although the U.S. government has funded (and in all likelihood continues to fund) the Tor project, the software’s source code is visible to everyone who uses it. So far, no one who has taken a serious look at the source code has ever found malicious backdoors in any version of the software released.

It is, however, important to be aware that this could change at any time. There is no guarantee preventing the developers of Tor using it as a tool for spying on the people who depend on it, but the likelihood of this happening is extraordinarily low.

Myth 2: Tor Makes You Absolutely Anonymous

It’s a very common misconception that Tor is a magical tool that will completely mask your identity at the push of a button. When using onion routing, make sure you keep in mind that it’s basically a glorified encrypted proxy. It is very effective at hiding where traffic originates from, but that information isn’t as important as the information you give away to places you visit. If you create accounts with personal data or communicate in public forums, it’s still going to be easy to find out who you are. You can be “made out” by a simple analysis of your writing style, your interests, your clicking habits, and several other factors that uniquely “belong” to you. My advice is to avoid giving personal data to anyone that you’re not ready to trust. Using Tor isn’t going to stop people from handing your information to third parties.

Myth 3: Tor Cannot Be Monitored


Tor has constantly been hailed as a tool that could bring an end to government-sponsored surveillance. To some extent, it is true that surveillance efforts will constantly hit obstacles when trying to monitor the OR network on any significant level. However, that doesn’t mean that such a task is necessarily impossible. Yes, your own IP would remain a mystery if someone were to find your traffic by looking at what your exit node is spewing out. But exit nodes themselves are not immune to being tracked. They can easily be geolocated as you can see here.

Myth 4: All My Traffic Is Encrypted

Whether you’re using Tor or not, my advice to you is to attempt to use HTTPS and TLS in every situation in which you can. Tor only encrypts traffic as it journeys through all of the nodes, but whatever comes out of the exit node is the plain-text version of your message. Someone with a bit of know-how can run an exit node that logs all of the information you sent through it and gain access to all of your accounts and emails. You’re doing yourself a disservice if you do not take every step possible to encrypt all of the data you send before it reaches the Tor network. It’s not a magical encryption tool.


I am completely aware that I sound like a naysayer right now, but it’s very important to understand all of the risks surrounding onion routing so that you can be prepared to compensate for them. It’s better to do this than to allow yourself to be lulled into a false sense of security. Tor is a powerful tool, but it has a very specific purpose. In the end, you must treat Tor like you would a socket wrench or power drill. You can’t build a house with it, but it’ll surely help you along the way!

Do you know of any other Tor myths that are circulating? Let us know in a comment!

Miguel Leiva-Gomez
Miguel Leiva-Gomez

Miguel has been a business growth and technology expert for more than a decade and has written software for even longer. From his little castle in Romania, he presents cold and analytical perspectives to things that affect the tech world.

Subscribe to our newsletter!

Our latest tutorials delivered straight to your inbox