# TOR NETWORK CHEAT SHEET ## 3-Node Circuit Overview |Client →|Entry Node →|Middle Node →|Exit Node →|Destination Website| | --- | --- | --- | --- | --- | ||(Knows you)|(Bridge only)|(Sees site)|| ### Traffic encryption: Layered like: Enc_Entry(Enc_Middle(Enc_Exit(Data))) Each node peels its layer and forwards. ## What Each Node Knows |Node|Sees Your IP|Sees Destination|Sees Traffic Content| |---|---|---|---| |Entry Node|Yes|No|No| |Middle Node|No|No|No| |Exit Node|No|Yes|Yes (if HTTP)| ## Risks If Nodes Are Compromised |Compromise Nodes|Result| |---|---| |Entry Only|Knows your IP, not destination| |Exit Only|Can see destination & HTTP content| |All 3 (Entry+Middle+Exit)|Can deanonymize and inspect traffic| ## Website Type Comparison |Feature|Normal Site (HTTPS)|Normal Site (HTTP)|.onion Site| |---|---|---|---| |IP Hidden|Yes|Yes|Yes| |Exit Node Used|Yes|Yes|No| |Content Encrypted|Yes|No|Yes (built-in)| |Strongest Anonymity|Good|Weak|Best| ## Best Practices with Tor Browser Use HTTPS only mode (enabled by default). Prefer .onion addresses when available. Avoid logging into personal accounts. Don’t open downloaded files outside Tor.