Revision as of 05:20, 19 June 2005 editDeeahbz (talk | contribs)Extended confirmed users3,070 editsm reorganized categories← Previous edit | Revision as of 21:51, 1 July 2005 edit undoDeeahbz (talk | contribs)Extended confirmed users3,070 editsm version update - 0.1.0.11Next edit → | ||
Line 4: | Line 4: | ||
caption = Tor logo | | caption = Tor logo | | ||
developer = Tor developers | | developer = Tor developers | | ||
latest_release_version = 0.1.0. |
latest_release_version = 0.1.0.11 | | ||
latest_release_date = ], ] | | latest_release_date = ], ] | | ||
operating_system = ] | | operating_system = ] | | ||
genre = ] | | genre = ] | |
Revision as of 21:51, 1 July 2005
File:Tor-logo.pngTor logo | |
Developer(s) | Tor developers |
---|---|
Stable release | 0.1.0.11 / June 30, 2005 |
Repository | |
Operating system | Cross-platform |
Type | Onion routing |
License | BSD license |
Website | tor.eff.org |
Tor, an anonymous Internet communication system, is a second generation Onion Routing network that allows people to communicate anonymously. Tor can be used as an outproxy to the regular Internet, or hidden services can be accessed inside the Tor network. Like the Freenet and GNUnet networks, Tor can be used to circumvent content filters, censorship laws, and other restrictions on communication. Unlike Freenet, which is a distributed, encrypted, data store, Tor aims to simply create a framework for anonymous communication.
Tor is an overlay network which uses Onion Routing to stream data between anonymous endpoints. Data that is sent through Tor is not stored unless a client application chooses to store the data. In contrast, publishing networks such as Freenet require data to be cached and spread throughout the network, and provide a very different sort of anonymity.
In outproxy mode, traffic on Tor is bounced around a centralized set of onion routing servers before leaving the Tor network and entering the regular Internet. This allows end users to access TCP services such as Web browsing, IRC, SSH, and instant messaging while maintaining their anonymity. Tor allows for heavy data transfers as well, though this is discouraged because it puts too much strain on the network's limited number of proxy servers.
Hidden services on Tor allow servers to expose publicly accessible locations while remaining anonymous. These locations are similar to an IP address, but instead use a cryptographic public key as a means of addressing. This allows Internet users to overcome government censorship laws, among other uses. Tor is often used with the filtering proxy software Privoxy as well as Squid, a popular web cache used to reduce the latency experienced when using Tor.
The Tor source code is published under a BSD license; precompiled versions of Tor are also available for Linux, Mac OS, and Windows.
The number of publicly accessible onion routers is steadily increasing.
Tor is endorsed and supported by the Electronic Frontier Foundation.
See also
- Onion Routing. See the Tor section for improvements of Tor over the original Onion Routing design.
- Java Anon Proxy
- Anonymous P2P
- I2P - A similar anonymous communication system that is designed as less of an outproxy network and more as a replacement for the conventional Internet.
- Misplaced Pages's policy toward anonymous proxies
External links
- Tor: An anonymous Internet communication system—hosted at the EFF
- Tor Wiki
- Design for Tor
- David Chaum Home page
- A list of publications
- David Chaum on Electronic Commerce: How Much Do You Trust Big Brother? — interview
- a remailer FAQ
- Remailer Vulnerabilities
- Mixmaster & Remailer Attacks
- Comparison of anonymizing networks
- Hidden Tor Wiki Tor is required to access this web site, provided through "hidden services"
Further reading
- Email Security, Bruce Schneier (ISBN 047105318X)
- Computer Privacy Handbook, Andre Bacard (ISBN 1566091713)