This is how Tor works: it wraps your communication in several layers of encryption and bounces it around many intermediate “relay” computers, each of which only knows the previous and next computers in the chain.[620] This way, it’s nearly impossible for anyone to trace communication over Tor; even the NSA reportedly has trouble with it.[621]