Skip to main content

Tor | Bitcoin Glossary | Mapping Bitcoin

Tor

Seguridad

Also known as: The Onion Router

The Onion Router, an anonymity network that encrypts and routes internet traffic through multiple relays to hide a user's IP address. Many Bitcoin and Lightning nodes use Tor to protect network privacy and resist censorship.

Overview

Tor (The Onion Router) is a privacy network that conceals users' IP addresses by routing their internet traffic through a series of encrypted relays operated by volunteers around the world. In the Bitcoin ecosystem, Tor plays a critical role in protecting the network-level privacy of node operators, wallet users, and Lightning Network participants.

How Tor Works

Tor uses layered encryption (hence "onion routing") to ensure that no single relay knows both the origin and destination of the traffic:

User                                           Destination
  |                                                 |
  |--[Encrypt 3 layers]-->  Entry Node              |
  |                           |                     |
  |                         [Remove layer 1]        |
  |                           |                     |
  |                         Middle Node              |
  |                           |                     |
  |                         [Remove layer 2]        |
  |                           |                     |
  |                         Exit Node               |
  |                           |                     |
  |                         [Remove layer 3]-->-----|
  |                                                 |

Entry node: knows user's IP, not destination
Middle node: knows neither
Exit node: knows destination, not user's IP

Tor in Bitcoin

Node Operation

Running a Bitcoin full node over Tor hides the operator's IP address from peers. This protects against:

  • Targeted attacks based on identifying node operators
  • Network-level surveillance correlating IP addresses with transactions
  • Censorship by ISPs or governments blocking Bitcoin traffic

Bitcoin Core has built-in support for Tor, and many node distributions (such as Umbrel and RaspiBlitz) configure Tor by default.

Lightning Network

Lightning nodes commonly use Tor to maintain privacy while keeping channels open and routing payments. Tor hidden services (.onion addresses) allow Lightning nodes to accept incoming connections without exposing their IP address.

Limitations

  • Tor adds latency due to multi-hop routing, which can affect Lightning payment speed.
  • Tor is not immune to sophisticated traffic analysis attacks by global adversaries.
  • Some Bitcoin peers may deprioritize or refuse connections from Tor nodes.
  • Eclipse attacks, where an adversary controls all of a node's Tor connections, are a known risk.

Common Misconceptions

Using Tor does not make Bitcoin transactions anonymous — it protects network-level privacy (IP address) but does not hide on-chain transaction patterns. For comprehensive privacy, Tor should be combined with on-chain techniques like CoinJoin or Silent Payments.