Tor encrypts all of your traffic so that your ISP won’t be able to read it, including DNS queries. However, it’s still tunneling your traffic through a remote server, so another ISP somewhere else will see your traffic as it exits the network. Unless you enter personally-identifying information, the ISP that sees your exiting traffic will have a very difficult time telling where it originally came from.

Written by

Writing about security for journalists, as well as beginners. Principal researcher at @freedomofpress. freedom.press/training

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store