

When the final layer is decrypted you get the plaintext (non-encrypted message). Each layer contains the next destination - the next router the packet has to go to. The resulting onion (fully encapsulated message) is then transmitted through a series of computers in a network (called onion routers) with each computer peeling away a layer of the ‘onion’. This is why it’s called The Onion Routing Protocol, because it adds layers at each stage. Each layer in Tor is encryption, you are adding layers of encryption to a Tor message, as opposed to just adding 1 layer of encryption. Onions have multiple layers to them, and so does a message going through Tor. In onion routing messages are encapsulated in several layers of encryption.

The core principle of Tor is onion routing which is a technique for anonymous & secure communication over a public network. This article gives a technical rundown of how the technology works, without speculation and without exaggeration of what Tor is. This article doesn’t talk about what’s on Tor, or how to access Tor. According to Kings College much of Tor is legal. Tor is much larger than what the media makes it out to be. You may know Tor as the hometown of online illegal activities, a place where you can buy any drug you want, a place for all things illegal. Ironically, Tor has seen widespread use by everyone - even those organisations which the U.S. The United States Naval Research Laboratory developed The Onion Routing Protocol (T0r) to project U.S.
