# TOR NETWORK CHEAT SHEET
## 3-Node Circuit Overview
|Client →|Entry Node →|Middle Node →|Exit Node →|Destination Website|
| --- | --- | --- | --- | --- |
||(Knows you)|(Bridge only)|(Sees site)||
### Traffic encryption:
Layered like: Enc_Entry(Enc_Middle(Enc_Exit(Data)))
Each node peels its layer and forwards.
## What Each Node Knows
|Node|Sees Your IP|Sees Destination|Sees Traffic Content|
|---|---|---|---|
|Entry Node|Yes|No|No|
|Middle Node|No|No|No|
|Exit Node|No|Yes|Yes (if HTTP)|
## Risks If Nodes Are Compromised
|Compromise Nodes|Result|
|---|---|
|Entry Only|Knows your IP, not destination|
|Exit Only|Can see destination & HTTP content|
|All 3 (Entry+Middle+Exit)|Can deanonymize and inspect traffic|
## Website Type Comparison
|Feature|Normal Site (HTTPS)|Normal Site (HTTP)|.onion Site|
|---|---|---|---|
|IP Hidden|Yes|Yes|Yes|
|Exit Node Used|Yes|Yes|No|
|Content Encrypted|Yes|No|Yes (built-in)|
|Strongest Anonymity|Good|Weak|Best|
## Best Practices with Tor Browser
Use HTTPS only mode (enabled by default).
Prefer .onion addresses when available.
Avoid logging into personal accounts.
Don’t open downloaded files outside Tor.