Generated by Llama 3.3-70B| Tor | |
|---|---|
| Name | Tor |
| Developer | The Tor Project |
| Initial release | 2002 |
| Operating system | Cross-platform |
| Genre | Anonymity network |
| License | Free and open-source software |
Tor is a free and open-source software project that provides anonymity to its users by routing their Internet traffic through a network of volunteer-operated servers, including those run by Electronic Frontier Foundation, Freedom of the Press Foundation, and Riseup. This network, which includes servers run by Université de Genève and MIT Computer Science and Artificial Intelligence Laboratory, allows users to communicate without revealing their IP address or location, making it a popular tool for journalists, whistleblowers, and human rights activists like Glenn Greenwald and Laura Poitras. Tor has been used by organizations such as WikiLeaks, The Guardian, and The New York Times to protect the identities of their sources, and has been supported by National Science Foundation and DARPA. The project has also received funding from Open Society Foundations and Knight Foundation.
Tor is based on the concept of onion routing, which was developed in the 1990s by David Goldschlag, Mike Reed, and Paul Syverson at the United States Naval Research Laboratory. The idea behind onion routing is to encrypt data multiple times, like the layers of an onion, and then send it through a series of nodes, making it difficult to trace the origin of the data, as used by Edward Snowden and Chelsea Manning. This concept has been implemented in various forms, including the I2P network, which is used by Pirate Bay and Freenet. Tor has become a widely used tool for online anonymity, with users including Julian Assange and Sarah Kendzior, and has been recognized by Pulitzer Prize and Knight-Batten Award for Innovations in Journalism.
The Tor project was initially developed by Paul Syverson and Nick Mathewson in the early 2000s, with funding from the United States Department of Defense and National Science Foundation. The project was later handed over to the Electronic Frontier Foundation, which continued to develop and maintain the software, with support from Google and Mozilla Foundation. In 2006, the Tor project became an independent non-profit organization, known as The Tor Project, with a board of directors that includes Shari Steele and Andrew Lewman. The project has received funding from various organizations, including Open Society Foundations and Ford Foundation, and has collaborated with Human Rights Watch and Amnesty International.
The Tor network consists of a large number of volunteer-operated servers, known as relays, which are run by individuals and organizations such as Université de Genève and MIT Computer Science and Artificial Intelligence Laboratory. These relays are connected to each other in a complex network, which allows data to be routed through multiple nodes, making it difficult to trace the origin of the data, as used by The Intercept and ProPublica. The network also includes bridge relays, which are used to connect to the Tor network from countries with restricted Internet access, such as China and Iran, and are supported by Reporters Without Borders and Committee to Protect Journalists. The Tor software uses a combination of public-key cryptography and symmetric-key cryptography to encrypt data, as developed by RSA Security and Bruce Schneier.
Tor is used by a wide range of individuals and organizations, including journalists, whistleblowers, and human rights activists like Glenn Greenwald and Laura Poitras. The software is also used by law enforcement agencies, such as the FBI and DEA, to conduct online investigations, as well as by hackers and cybersecurity researchers like Kevin Mitnick and Dan Kaminsky. Tor has been used to access censored websites and to communicate with dissidents in countries with restricted Internet access, such as Syria and North Korea, and has been supported by Human Rights Watch and Amnesty International. The software has also been used by WikiLeaks and The Guardian to protect the identities of their sources, and has been recognized by Pulitzer Prize and Knight-Batten Award for Innovations in Journalism.
The security of the Tor network is based on the principle of anonymity, which makes it difficult to trace the origin of data, as used by Edward Snowden and Chelsea Manning. The network uses a combination of encryption and traffic analysis to protect user data, as developed by RSA Security and Bruce Schneier. However, the network is not completely secure, and there have been several instances of security breaches and vulnerabilities being discovered, as reported by The Intercept and ProPublica. The Tor project has a team of developers and security experts, including Nick Mathewson and Roger Dingledine, who work to identify and fix vulnerabilities, and has collaborated with Google and Mozilla Foundation to improve the security of the network.
Despite its popularity, Tor has faced several criticisms and controversies, including concerns about its use by criminals and terrorists, as reported by FBI and DEA. The network has also been criticized for its slow speeds and limited accessibility, as well as its potential for abuse by hackers and cybersecurity researchers like Kevin Mitnick and Dan Kaminsky. Additionally, the project has faced funding challenges and has been criticized for its reliance on government funding, as reported by The Guardian and The New York Times. However, the project has also received support from organizations such as Open Society Foundations and Ford Foundation, and has been recognized by Pulitzer Prize and Knight-Batten Award for Innovations in Journalism. The project has also collaborated with Human Rights Watch and Amnesty International to improve the security and accessibility of the network, and has been supported by National Science Foundation and DARPA. Category:Free software