How Do Tor Onion Addresses Actually Work?
Tor Onion addresses, also known as .onion addresses, work by using a unique system of encryption and routing within the Tor network. When a user enters a .onion address into their Tor browser, the following steps occur:
1. The Tor browser encrypts the .onion address using the public key of the Tor relays that the user’s traffic will pass through.
2. The encrypted .onion address is then sent through multiple Tor relays, each adding another layer of encryption to the address.
3. The final Tor relay decrypted the address and forwards the user’s request to the hidden service running at the .onion address.
4. The hidden service then sends a response back through the Tor network to the user’s browser, again encrypting and routing the traffic through multiple Tor relays.
The unique encryption and routing system of the Tor network allows for the creation of .onion addresses that are hidden from traditional DNS systems. This allows for the creation of hidden services and anonymous browsing and communication within the Tor network, where the identities and locations of users are obscured.