
Tor's most widely used application takes the form of a web browser. Browsing via the Tor network ensures that a user's personal details - such as their IP address and location - cannot be identified by websites monitoring user activity. The final relay peels away the last layer to send the original data to its destination without ever knowing its source. Data is transmitted through a global network of Tor relays, decrypting only one layer of encryption at once to reveal the next relay. This involves using several layers of encryption that are progressively peeled away like the layers of an onion. Tor is a decentralized anonymous network based on the principal of onion routing.


The new version of Tor also now features code-signing for Mac OS X, promising easier installation on systems running Apple's operating system.
