Licence: 3-clause BSD | www.torproject.org
Since 2008, the Tor Browser has been making waves in providing online privacy. Successive versions are based on Firefox ESR (in this case version 102.8) and come with a number of features to make you as anonymous online as possible. Since our last look the Tor Browser has seriously upped its game in terms of protecting your privacy and evading censorship.
Onion 101
The Tor Browser uses so-called onion routing to keep your location and data safe. It works by encapsulating and removing various layers of the encryption, much like peeling an onion.
When the Tor Browser first launches, by default it searches for a list of Tor entry nodes, sometimes known as guard relays, and downloads the public encryption key for one at random. It then establishes an encrypted connection to this entry node.