"Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis and threat."

TrustCor is proud to support the Tor Project by contributing hardware, electricity and bandwidth in the form of high-speed exit relay and bridge services, from our Curacao, Netherland Antilles location.

TrustCor, The Tor Project, Inc. and The Tor (Anonymity Online) Network

Tor Project, Inc.

TrustCor is an advocate of the Tor Network and Tor Project, Inc. TrustCor contributes to the Tor Network, through the provision of Exit Relay and Bridge services, from the Island of Curacao. In addition, TrustCor developers and contractors are actively working on solutions that leverage the Tor Network.

More information on TrustCor's Exit Relay can be found here.

Some content and logos on this page are copyright the Tor Project, Inc.

Recommended Desktop and Mobile Software Clients

TrustCor promotes and encourages consumers seeking greater privacy on the Internet to consider using the Tor Browser (for Windows, Linux and Mac OS X), Red Onion (for iOS) and/or Orbot (for Google Android devices).

Tor Browser

Tor Browser

The flagship product of the Tor Project for Windows, Linux and Mac OS X.

Red Onion

Red Onion

Tor-powered web browser for anonymous browsing from iDevices.



Orbot is a free proxy app that empowers other apps to use the internet more securely.

What is Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. It provides a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses. Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Who made Tor?

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory, with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into the hands of people.

Can Tor protect you?

Yes. Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.