Tor Browser is the primary tool for accessing the dark web. This guide explains how onion routing works, what Tor does and doesn't protect, when it's appropriate to use, and its legal status for Hong Kong residents.
Tor (The Onion Router) is a network of volunteer-operated servers (called relays or nodes) that provides anonymity by routing internet traffic through multiple encrypted layers. The name "onion routing" comes from this layered encryption: when you send a request through Tor, your Tor client encrypts the data multiple times — once for each relay in the path — creating concentric encryption layers like an onion. Each relay decrypts only one layer (its own), revealing the address of the next relay to forward the data to, but not the original sender or the final destination. This means no single relay knows both who sent the data and where it is going — the entry relay knows your IP address but not the destination; the exit relay knows the destination but not your IP address; the middle relay knows neither.
A standard Tor circuit uses three relays: an entry guard (which knows your real IP), a middle relay, and an exit relay (which knows the destination). Your Tor client selects these three relays randomly from the global Tor network of approximately 8,000 volunteer-operated servers. The circuit is rebuilt every 10 minutes for different connections, meaning your exit relay changes regularly, further complicating any attempt to trace communication patterns. For .onion (to Check If Your Data Is on the Dark Web">dark web) sites, the routing is even more complex — both the client and the server use Tor hidden service protocols that create a rendezvous point in the middle of the network, so neither side knows the other's IP address. This bidirectional anonymity is what makes .onion services difficult for law enforcement and ISPs to locate.
Tor Browser is a hardened version of Firefox pre-configured to route all traffic through the Tor network. It disables JavaScript by default (or limits it in standard mode), blocks tracking cookies, prevents browser fingerprinting, and includes additional privacy protections. The Tor Project maintains Tor Browser as free, open-source software available from torproject.org — the only official source. Downloading Tor Browser from any other source risks obtaining a modified version that may contain malware or backdoors. Tor Browser is available for Windows, macOS, Linux, and Android, and is fully functional from Hong Kong without VPN for most use cases (though some configurations may require "bridges" — unlisted relays — if Tor appears to be throttled by local ISPs).
Tor provides strong protection against network-level surveillance: your ISP (whether HKT, HK Broadband, or any other) can see that you are using Tor, but cannot see the content of your traffic or which sites you are visiting. Government-level surveillance systems that monitor ISP traffic can similarly identify Tor usage but cannot determine your browsing activity within Tor. This makes Tor effective for circumventing ISP-level content filtering, hiding your internet activity from network-level observers, and preventing websites from identifying your real IP address and location. For journalists, researchers, activists, and whistleblowers, these protections are significant. For ordinary users concerned about commercial tracking, Tor also blocks the IP-based tracking that advertising networks use to follow users across websites.
Tor does not protect against behavioural deanonymisation — where your activity patterns, writing style, or the specific information you share reveals your identity even when your IP is hidden. Law enforcement has successfully identified Tor users by analysing the content of their communications and matching writing patterns, timing correlations, and operational security mistakes. Tor also does not protect against malware on your device: if your computer is compromised by a keylogger, spyware, or a browser vulnerability, Tor provides no protection since the attacker is already inside your device before traffic is encrypted. For HK users in particular, Tor does not protect against active monitoring at the application layer — if you log into your real Google account while using Tor, Google knows your identity regardless of your anonymised IP address.
The exit relay vulnerability is a practical concern for Tor users visiting regular (non-.onion) websites. The exit relay — the last relay before your traffic reaches its destination — must decrypt the outer layer of Tor's encryption to communicate with the destination server. If the connection between the exit relay and the destination is HTTP (not HTTPS), the exit relay operator can read the plaintext content of your traffic. Malicious exit relays have been documented conducting man-in-the-middle attacks on unsecured traffic. For this reason, always ensure connections from Tor Browser show HTTPS (look for the padlock icon) — this encrypts the traffic between the exit relay and the destination, leaving only your general browsing behaviour (domain names, not content) visible to the exit relay operator. This vulnerability does not apply to .onion sites, where the entire connection remains within the Tor network with end-to-end encryption.
Using Tor Browser in Hong Kong is entirely legal. There is no Hong Kong legislation that prohibits using anonymisation software, accessing .onion addresses, or routing internet traffic through the Tor network. What is illegal is not the tool but the activity — the Computer Crimes Ordinance (Cap. 200), the Theft Ordinance, and the Organised and Serious Crimes Ordinance apply to criminal activities whether they are conducted using Tor, a regular browser, or any other means. The same illegal activities (fraud, trafficking, distributing child sexual abuse material, drug sales) are illegal regardless of the technical means used. Conversely, legal activities — journalism, research, privacy-conscious browsing, reading content not available due to geo-restrictions — remain legal regardless of whether you use Tor to access them.
Tor has significant legitimate uses that are relevant to Hong Kong residents and professionals. Journalists and sources communicating sensitive information benefit from Tor's anonymity protections — the Tor Project maintains a SecureDrop directory of news organisations (including international outlets covering Hong Kong) that provide .onion submission channels for whistleblowers and sources. Legal professionals handling sensitive client communications, researchers studying cybersecurity threats (including dark web markets and criminal forums, for the purpose of understanding and defending against them), privacy advocates testing the effectiveness of tracking and surveillance technologies, and ordinary citizens who prefer stronger privacy protections for their general browsing all have legitimate reasons to use Tor. The BBC, ProPublica, New York Times, and many other reputable news organisations maintain .onion versions of their websites specifically to improve accessibility in regions with internet restrictions.
Cybersecurity researchers and dark web monitoring services use Tor professionally to crawl dark web markets and forums for intelligence about stolen data, emerging threats, and criminal tradecraft. This is the legitimate activity that enables the monitoring services discussed throughout this guide — they use Tor to access the same platforms where stolen data is traded, scanning for their clients' information without engaging in any criminal activity themselves. For ordinary Hong Kong residents, the most relevant use case is not accessing the dark web directly but understanding that the monitoring services they use to protect their data do this work on their behalf. You don't need to use Tor yourself to benefit from dark web intelligence — dark web monitoring services handle the technical access while you simply receive the alerts.
If you have legitimate reasons to use Tor Browser, following best practices maximises the privacy it provides while minimising risks. The most important rule is compartmentalisation: do not mix your Tor-anonymised browsing with your regular identity. Never log into personal accounts (Google, social media, banking) while using Tor — this immediately deanonymises you by providing the service with your real identity, negating Tor's protection. Create separate, dedicated accounts for any services you need to use through Tor (for example, a ProtonMail account accessible only through Tor for sensitive communications). This compartmentalisation principle extends to browser tabs — in Tor Browser, opening a new tab in the same window may use the same circuit; use "New Identity" from the Tor menu for a completely fresh circuit when switching activities.
Keep Tor Browser updated religiously. The Tor Project releases regular security updates, and outdated versions may contain vulnerabilities that can be exploited by malicious .onion sites or exit relays. Tor Browser checks for updates automatically; approve updates immediately when notified. Never install browser extensions in Tor Browser — additional extensions can fingerprint your browser, introduce vulnerabilities, and break Tor's privacy guarantees. The preset Tor Browser configuration with no additional extensions is the recommended setup for privacy. Avoid downloading files through Tor unless absolutely necessary — downloaded files (PDFs, Office documents, videos) may contain tracking elements or make network requests that bypass Tor and reveal your real IP address.
For Hong Kong users considering Tor for their checking of dark web exposure, the practical recommendation is that you do not need to use Tor at all. Dark web monitoring services and HIBP provide the intelligence you need without requiring direct access to dark web markets. If you want to investigate whether a specific .onion URL is legitimate (for example, to verify a journalist submission portal), use Tor Browser in a virtual machine rather than on your primary device — this provides an additional layer of isolation in case the .onion site attempts to exploit browser vulnerabilities. For most Hong Kong residents, the appropriate use of dark web intelligence is passive: set up monitoring services, receive alerts, and take remediation action — without ever needing to access dark web content directly.