The Tor browser provides anonymity for user activities on the Internet. It hides identity and protects web connections from various types of tacking. Tor can be used to bypass blocks.
The interaction with the network in Tor is encrypted; requests before reaching the destination go from one relay to another. Combined with the HTTPS proxy, it provides end-to-end encryption.
Learn more about the difference between HTTP(s), Socks5 and Socks4 proxies.
The following actions also occur:
After all the steps, it will be quite difficult to identify both the user himself on the network and his use of the Tor browser.