Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Tor Project Protects Anonymous Sources

 
 



The second-generation onion routing technology embodied by the Tor project aims to provide a secure means of anonymous Internet use.

Many parties have a stake in providing, using, observing or even preventing anonymous Internet usage. These players range from multinational corporations to national governments to disenfranchised individuals. The most visible players are the Tor project itself and the Electronic Frontier Foundation, which once funded and still hosts the Tor project.


Tor provides anonymous Internet access for a variety of uses. Development is moving ahead, driven by open-source volunteerism, but the money needed to take the project mainstream has been limited, and questions remain whether there will be enough funding to ensure long-term viability. Also, the enterprise must decide what role Tor will play and if the legal grayness surrounding such privacy tools can be offset by the benefits. Tor is promising, but it may be prudent to wait and see how these issues pan out.

Encrypting internet communications is a great start in addressing privacy concerns. But encryption solves only part of the anonymity issue: It hides what is being said, but not who is communicating.

Anonymous services take that next step to protect the parties in an online communication. The Tor project. a network of servers deployed across the Internet, is intended to shield parties from prying eyes and ears. Tor ("the onion router") describes both the development project and related software created to advance the privacy technology. Tor also provides a feature called hidden services that lets servers remain anonymous and provides secure services exclusive to the Tor network that are not visible, nor available, to the Internet public.

Tor offers many practical uses, such as researching sensitive topics and ensuring you can view the same information as the general public on a competitor's Web site. And, it can protect your VPN connections.

  • 1