Tor enables anonymous internet communication by routing traffic through a series of globally located servers or nodes. When a user connects to Tor, their data is encrypted and passed through selected Tor nodes, with each node decrypting a layer of data and exposing the next node’s address. This process continues until the data reaches its destination, making it incredibly difficult to trace the data back to its source.