Tor provides anonymity by building circuits with 3 relays. So, instead of connecting directly to the destination server, a connection is made between each relay of the circuit and this takes more time.
[[!img tor/tor.png link="no" class="svg" alt="A Tor connection goes through 3 relays with the last one establishing the actual connection to the final destination"]]
Some people misuse the Tor network, sometimes on purpose or sometimes by lack of knowledge. For instance, Tor is sometimes used to conduct [[!wikipedia Ddos#Distributed_attack desc="DDoS attacks"]]. By doing this, the Tor relays are the ones who actually suffer from the attack, instead of the intended target.Some people use [[!wikipedia Peer_to_peer desc="peer-to-peer software"]] through Tor which is bad for the network.