
Though the Tor project was fully developed in 2006, the idea of it started to form a lot earlier, in the mid-1990s.

But all of those involved in the project, have in common this strong belief: web users should be able to have private, uncensored access to the Internet. Like the many users of the Tor browser, the developers, researchers and founders, who have made Tor browser use possible, is a very versatile group of people. So here’s how it works – Tor randomly connects to one of the public entry nodes, reverses the traffic through a randomly selected central relay, and at last binds the traffic through the third and last exit node. The browser consists of a three-layer proxy, like the layers of an onion (which explains why this vegetable is the browser’s logo). The Tor browser is an internet browser that anonymizes your web traffic, using the Tor network, which makes it easier to hide your identity online.
