Wireless onion router

Tor works using an overlaid network which is free throughout the world, this overlay network is created by using numerous relay[2] points created using volunteer which helps the user hide personal information behind layers of encrypted data like layers of an onion.

The data captured by them won't make any sense as it will only look like messed up text.

These are small and handy which will give the user a freedom to carry this tool and connect to the network from anywhere.

[4] The packets that transferred using Tor also are slow because of the increased amount of hops with encryption and decryption.

Some of the examples are Inspection of control messages of BitTorrent,[10] Hijacking responses of the trackers,[10] exploitation of distributed hash tables.