Misplaced Pages

Tor (network): Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively
← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 11:01, 10 May 2005 edit195.194.68.22 (talk) See also: deleted link to Tor (Anonymous network)← Previous edit Revision as of 11:35, 11 May 2005 edit undo138.251.155.236 (talk) External linksNext edit →
Line 29: Line 29:


== External links == == External links ==
* *
* *
* — interview * — interview
Line 35: Line 35:
* *
* *
*


==Further reading== ==Further reading==

Revision as of 11:35, 11 May 2005

Tor, an anonymous Internet communication system, is a second generation Onion Routing network that allows people to communicate anonymously. Tor can be used as an outproxy to the regular Internet, or hidden services can be accessed inside the Tor network. Like the Freenet and GNUnet networks, Tor can be used to circumvent content filters, censorship laws, and other restrictions on communication. Unlike Freenet, which is a distributed, encrypted, data store, Tor aims to simply create a framework for anonymous communication.

Tor is an overlay network which uses Onion Routing to stream data between anonymous endpoints. Data that is sent through Tor is not stored unless a client application chooses to store the data. In contrast, publishing networks such as Freenet require data to be cached and spread throughout the network, and provide a very different sort of anonymity.

In outproxy mode, traffic on Tor is bounced around a centralized set of onion routing servers before leaving the Tor network and entering the regular Internet. This allows end users to access TCP services such as Web browsing, IRC, SSH, and instant messaging while maintaining their anonymity.

Hidden services on Tor allow servers to expose publically accessible locations while remaining anonymous. These locations are similar to an IP address, but instead use a cryptographic public key as a means of addressing. This allows Internet users to overcome government censorship laws, among other uses.

The Tor source code is published under a DFSG free license; a precompiled version of Tor is also available for Microsoft Windows.

The number of publicly accessible onion routers is steadily increasing.

Tor is endorsed by the Electronic Frontier Foundation.

See also

External links

Further reading

  • Email Security, Bruce Schneier (ISBN 047105318X)
  • Computer Privacy Handbook, Andre Bacard (ISBN 1566091713)
Categories: