

All they do is remove a layer of encryption and pass the data to the next relay. The subsequent relays don't have your IP address or know which site you're trying to visit.

The only information it has is the address of the next relay. It can't see which site you're trying to access either, which means there's no way to log what you're doing. The guard relay knows your IP address (opens in new tab), but has no other clues to your identity. In fact, Tor stands for 'The Onion Router', and takes its name from this layering idea. The first (or 'guard') relay receives your data and peels off the first layer of encryption, like the layer of an onion. This involves encrypting your data multiple times, then passing it through a network of volunteer-run servers (or 'relays') from around the world.
