Tor can be complicated to use and set up, which means it is easy to reveal your true identity through data leaks or behaviour that might reveal personal information.
There is some evidence that Tor users can be de-anonymized by US law enforcement agencies and academic researchers.
This means you are at risk of surveillance or malware injection via malicious exit nodes.
Your web traffic is fully decrypted and visible at the exit node, although it is not traceable to your identity.
Tor’s exit node can see your activity but not your IP address. Tor’s guard node can see your public IP address but not your activity.
While your browsing data is anonymous, it is not private.
This hides your IP address from the websites you visit and prevents your ISP (Internet Service Provider) from monitoring your activity.
Tor routes your web traffic through a network of randomized servers and protects it with three layers of encryption.