Generated by DeepSeek V3.2| Tor (network) | |
|---|---|
![]() | |
| Name | Tor |
| Developer | The Tor Project |
| Genre | Onion routing, Anonymity network |
Tor (network). The Tor network is a free, open-source software and decentralized system designed to enable anonymous communication online. It directs internet traffic through a worldwide, volunteer-run overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. The system, originally developed by the United States Naval Research Laboratory, is now maintained by the non-profit organization The Tor Project, with financial support from entities like the Electronic Frontier Foundation and various government agencies.
The core purpose of the network is to provide privacy and anonymity by overcoming the inherent identifiability of standard Internet Protocol connections. Its architecture is based on the principle of onion routing, a technique for anonymous communication over a computer network where messages are encapsulated in layers of encryption, analogous to layers of an onion. This design prevents any single node in the pathway from knowing both the origin and final destination of the data. The network is widely used by a diverse group of individuals, including journalists under repressive regimes, human rights activists, law enforcement officers, and ordinary citizens seeking to protect their privacy from corporate and state surveillance.
When a user runs the Tor software, their traffic is not sent directly to the destination server. Instead, it is randomly routed through a circuit of three successive, volunteer-operated relays: an entry guard, a middle relay, and an exit relay. Each relay decrypts a single layer of encryption to reveal only the next relay in the circuit, with the final relay decrypting the innermost layer and sending the original data to the target website. This process obscures the user's IP address from the destination. For accessing services within the Tor network itself, users can connect to hidden services, which use the `.onion` address suffix and are not reachable via the conventional Domain Name System.
While Tor provides strong anonymity against network observers, it is not impervious to all threats. End-to-end timing correlation attacks, where an adversary controls both the entry and exit relays, can potentially deanonymize users. Furthermore, vulnerabilities in user applications, such as web browser plugins, can leak identifying information. The exit relay, which handles the final unencrypted connection to the public internet, can also monitor unencrypted traffic, posing risks if services like HTTP are used instead of HTTPS. Organizations like the Federal Bureau of Investigation have occasionally compromised specific hidden services through software exploits, not by breaking the core Tor protocol.
The network has a wide spectrum of applications, from privacy-preserving to controversial. It is a critical tool for whistleblowers communicating with media outlets like The Guardian or The Washington Post, and for citizens in countries with extensive internet censorship like China or Iran. Law enforcement and intelligence agencies, including the Central Intelligence Agency, use it for open-source intelligence gathering. Conversely, the anonymity it provides has also facilitated its use on dark web marketplaces, such as the former Silk Road, for illicit trade. Major technology companies, including Facebook and the BBC, operate `.onion` versions of their sites to provide secure access.
The foundational research on onion routing was conducted in the mid-1990s by mathematicians David Goldschlag, Michael Reed, and Paul Syverson at the United States Naval Research Laboratory. The initial code for The Onion Routing project was developed by Roger Dingledine and Nick Mathewson, who later co-founded The Tor Project with a mission to advance human rights. Early funding came from the U.S. Naval Research Laboratory and the Defense Advanced Research Projects Agency. The network has since evolved through significant events, including its use during the Arab Spring uprisings and the public disclosure of global surveillance programs by Edward Snowden, which highlighted its importance.
The legal status of using or operating Tor relays varies by jurisdiction, though it is generally legal in most democratic nations. However, its association with criminal activity on the dark web has led to scrutiny from agencies like the Federal Bureau of Investigation and Europol. Ethical debates center on the dual-use nature of the technology: it is simultaneously a shield for political dissidents and a tool for criminal enterprises. Legal precedents, such as rulings by the United States Court of Appeals for the Ninth Circuit, have generally upheld that merely using the network is not probable cause for a search, affirming its legitimate privacy uses.
Category:Anonymity networks Category:Internet privacy Category:Onion routing Category:Free software