TOR Browser

What is Tor?


Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Tor does not prevent an online service from determining when it is being accessed through Tor. Tor protects a user's privacy but does not hide the fact that Tor is being used. Some websites restrict what is allowed when using Tor. For example, the MediaWiki Tor Block extension automatically restricts edits made through Tor, although Wikipedia allows some limited editing in exceptional circumstances.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.


How does Tor work?


Using Tor is relatively easy. You can simply download and install the Tor Browser, which would replace Chrome, Firefox, or whatever browser you normally use but tor browsing is slow. Anything you do on the Tor browser is then private and secure.

Tor bundles your data into encrypted packets before it enters the network. Tor then removes the part of the packet that contains information like the source, size, destination, and timing, all of which can be used to learn about the sender (that’d be you.) Next, it encrypts the rest of the bundled information before finally sending the encrypted data through many different servers, or relays, at random so that it can’t be tracked.

Each relay decrypts and then re-encrypts just enough data to know where it came from and where it’s going next, but can’t track the information beyond that. The many layers of encryption Tor use to ensure anonymity are similar to an onion, hence the name. The illustration below is a good (albeit very simplified) explanation of how Tor works.

Comments

Popular posts from this blog

Phishing

CySCA 2014 Web Penetration Testing Write-up

Double Submit Cookies Patterns