Tor

Tor

Tor, short for "The Onion Router," is an open source privacy network that permits users to browse the web anonymously. The network sends the information to User A’s IP address, which encrypts the information and passes it on to User B’s address, which performs another encryption and passes it on to User C’s address, which is the last address, known as the exit node. With Tor, however, the Tor network intercepts the traffic from your browser and bounces a user’s request off a random number of other users’ IP addresses (computers) before passing the user’s request onto the final destination. The network retrieves an IP address that is paired to that domain name from the DNS (Domain Name System) and sends it back to the user’s IP address once access is authorized. The Tor network obfuscates users’ IP addresses from unwanted surveillance by keeping the users’ requests, communications, transactions, and identities untraceable and private — but not necessarily secure.

The Tor network is a secure, encrypted protocol to ensure privacy of data and communications on the web.

What Is Tor?

Tor, short for "The Onion Router," is an open source privacy network that permits users to browse the web anonymously. Tor was initially developed and solely used by the U.S. Navy to protect sensitive government communications before the network was made available to the public.

The Tor network is a secure, encrypted protocol to ensure privacy of data and communications on the web.
Short for "The Onion Router," the system uses a series of layered nodes to hide IP address, online data, and browsing history.
Originally developed by the U.S. government, it is now seen as dangerous in the hands of the public, who may use the Tor network for illegal or unethical purposes.

Understanding Tor

The digital era has disrupted the traditional way of doing things in every sector of the economy by introducing products such as e-commerce, social media, cryptocurrency, cloud computing, and big data. The rapid rise in the development and innovation of digital products has given way to frequent data breaches and cyber thefts.

In response, consumers are increasingly opting for products that offer data privacy and cybersecurity. Internet users who engage in digital marketplaces, digital payments, and community forums are demanding more anonymity in the way their online communications and transactions are shared. Data anonymization platforms are meeting these demands in the forms of dark wallets and underground networks. Tor is one such underground network that was implemented for the purpose of protecting users’ identities.

The Tor network is one example of the many emerging technologies that attempt to fill a data privacy void in a digital space plagued by cybersecurity concerns. Its open source feature means that its source code is accessible to any user to upgrade or enhance. This, in turn, means that more advanced versions of anonymized networks are bound to emerge over the years.

Using Tor

The Tor network uses an onion routing technique for transmitting data, hence, the original name, Onion Router. To operate within the Tor network, a user has to install the Tor browser. Any address or information requested using the browser is transmitted through the Tor network.

Normally, each user’s computer that accesses the internet is given an IP address by an internet service provider (ISP). With traditional browsers, when a user requests or enters a domain name (e.g. www.investopedia.com) into the address bar, they are requesting the IP address of that domain. The network retrieves an IP address that is paired to that domain name from the DNS (Domain Name System) and sends it back to the user’s IP address once access is authorized.

With Tor, however, the Tor network intercepts the traffic from your browser and bounces a user’s request off a random number of other users’ IP addresses (computers) before passing the user’s request onto the final destination. The network sends the information to User A’s IP address, which encrypts the information and passes it on to User B’s address, which performs another encryption and passes it on to User C’s address, which is the last address, known as the exit node.

This last node decrypts the encrypted data and finally relays the request to the final destination (say, www.investopedia.com). This final address thinks the request came from the exit node, and grants access to it. The encryption process across multiple computers repeats itself from the exit node to the original user.

The Tor network obfuscates users’ IP addresses from unwanted surveillance by keeping the users’ requests, communications, transactions, and identities untraceable and private — but not necessarily secure.

In 2016, the FBI used complex hacking skills to crack down on owners and users of a Tor-hosted website called Playpen, considered the largest child pornography website.

While there may be some legitimate reasons for wanting one’s data anonymized — such as protecting sensitive government information — the use of underground networks also opens the door to illegal activities. The Silk Road site, a notorious underground marketplace known for hosting illegal drug transactions in bitcoin currency and subsequently shut down by the FBI in 2013, used the Tor network as its host.

Related terms:

Bitcoin

Bitcoin is a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments. read more

Blockchain : What You Need to Know

A guide to help you understand what blockchain is and how it can be used by industries. You've probably encountered a definition like this: “blockchain is a distributed, decentralized, public ledger." But blockchain is easier to understand than it sounds. read more

Cloud Computing

Cloud computing is a model for delivering information technology services where resources are retrieved from the internet through web-based tools. read more

Cryptocurrency : What Is Cryptocurrency?

A cryptocurrency is a digital or virtual currency that uses cryptography and is difficult to counterfeit because of this security feature. read more

Cybersecurity

Cybersecurity refers to the measures taken to keep electronic information, as well as hardware and software, private and safe from damage or theft. read more

Dark Web

The dark web refers to encrypted online content that is not indexed on conventional search engines. Read about the pros and cons of the dark web. read more

Data Anonymization

Data anonymization seeks to protect private or sensitive data by deleting or encrypting personally identifiable information from a database. read more

De-Anonymization

De-anonymization is a form of reverse data mining that re-identifies encrypted or obscured information. read more

Encryption

Encryption is a means of securing digital data using an algorithm and a key. read more

IP Address

An IP address is a unique identifier associated with a computer or network, which allows users to send and receive data. read more