Tor

«Tor (previously an acronym for The Onion Router) is free software for enabling online anonymity and censorship resistance. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including visits to Web sites, online posts, instant messages, and other communication forms, back to the user and is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their internet activities from being monitored. An extract of a top secret appraisal by the NSA characterized Tor as ‹the King of high secure, low latency Internet anonymity› with ‹no contenders for the throne in waiting›.

The term ‹onion routing› refers to layers of encryption, nested like the layers of an onion, used to anonymize communication. Tor encrypts the original data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Since the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communication can be de-anonymized through network surveillance that relies upon knowing its source and destination.

An adversary unable to defeat the strong anonymity that Tor provides may try to de-anonymize the communication by other means, for instance by exploiting vulnerable software on the user’s computer. One technique developed by the NSA that targets outdated Firefox web browsers is codenamed EgotisticalGiraffe.» (Source: wikipedia.org, 2014-02-16)

Table of Contents

Links

In the Press

Images

how-tor-works-1
how-tor-works-2
how-tor-works-3
How Tor works (Source: torproject.org, 2013-01-14)

tor-number-of-egyptian-users-2011
Number of Egyptian Tor users at the beginning of the revolution in Egypt, January 2011
(Source: metrics.torproject.org, 2013-01-14)

Videos

All images:
© Tor Project
Creative Commons license: CC BY 3.0 US

Diese Seite ist auch in Deutsch verfügbar.

Leave a Reply

Your email address will not be published.