commit a00c4db4203c15b7edd589f800f7657dd55d5a75
Author: emma peel <[email protected]>
Date:   Thu Sep 2 15:00:38 2021 +0200

    recover new file
---
 content/about/contents.lr | 29 +++++++++++++++++++++++++++++
 1 file changed, 29 insertions(+)

diff --git a/content/about/contents.lr b/content/about/contents.lr
new file mode 100644
index 0000000..33bf3d4
--- /dev/null
+++ b/content/about/contents.lr
@@ -0,0 +1,29 @@
+_model: topic
+---
+title: ABOUT TOR BROWSER
+---
+description: Learn what Tor Browser can do to protect your privacy and 
anonymity
+---
+seo_slug: about
+---
+key: 1
+---
+body:
+
+Tor Browser uses the Tor network to protect your privacy and anonymity. Using 
the Tor network has two main properties:
+
+* Your internet service provider, and anyone watching your connection locally, 
will not be able to track your internet activity, including the names and 
addresses of the websites you visit.
+
+* The operators of the websites and services that you use, and anyone watching 
them, will see a connection coming from the Tor network instead of your real 
Internet (IP) address, and will not know who you are unless you explicitly 
identify yourself.
+
+In addition, Tor Browser is designed to prevent websites from 
“fingerprinting” or identifying you based on your browser configuration.
+
+By default, Tor Browser does not keep any browsing history. Cookies are only 
valid for a single session (until Tor Browser is exited or a [New 
Identity](/managing-identities/#new-identity) is requested).
+
+### HOW TOR WORKS
+
+Tor is a network of virtual tunnels that allows you to improve your privacy 
and security on the Internet. Tor works by sending your traffic through three 
random servers (also known as *relays*) in the Tor network. The last relay in 
the circuit (the “exit relay”) then sends the traffic out onto the public 
Internet.
+
+<img class="" src="../static/images/how-tor-works.png" alt="How Tor Browser 
works">
+
+The image above illustrates a user browsing to different websites over Tor. 
The green middle computers represent relays in the Tor network, while the three 
keys represent the layers of encryption between the user and each relay.



_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to