This document provides an overview of the Tor anonymity network. It discusses how Tor aims to conceal users' identities and online activity by routing data through at least three different routers, with encryption at each node except the beginning and end. The document outlines Tor's history and how it works, addressing its weaknesses, typical users, and licit and illicit uses. It also includes an agenda, abstract, timeline, and references.