
Some of the main practical use cases of the Tor network are to enable anonymous communication between cybercriminals, the drug trade, financial fraudsters and paedophiles. Additionally Facebook and some other legitimate sites have a Tor presence.

Whilst this can be used in order to facilitate communication in hostile environments and enable dissidents and political activists to communicate securely there are other use cases. This network architecture enables anonymity and privacy. The way in which this network functions is to have layered encryption and routing via a route of entry, relay and exit nodes as is visible diagrammatically below.

The second generation of this research is referred to as ‘the onion routing’ network. The Tor network is borne out of a research project by the Naval Research Laboratory and Defence Advanced Research Projects Agency called Onion Routing.
