Ever since it came on the scene, Tor has allowed many an Internet user to surf the Web, chat, and explore without fear of being tracked online.
In this day and age of censorship running amok in some countries, mass surveillance, and outright tracking of the people by agencies such as the NSA and CIA, it becomes necessary to have ways of protecting ourselves online. Tor is such a way.
The last two days, I’ve covered a very good way to protect yourself online – VPNs. I’ve explored how they work, which are the best options for you, and how to get them.
Today, I’ll cover how the Tor browser works, in an easy way you can understand, through 5 simple facts you can easily understand.
Lets get started, shall we?
1 - Tor stands for “The Onion Router”
Gonna start with some history here – feel free to skip If this doesn’t interest you. It will be brief!
The history behind this tech starts in the good ol’ 90s, when some military scientists decided to invent a way to protect America’s communications online.
DARPA took it on and improved it a lot. By 2002, an alpha version of this technology came out.
A couple of years later, with the help of the US Government, the Tor browser was launched.
It has attracted some attention in tech circles in recent years – you see, it’s supposed to be unhackeable. That’s one of its’ main calling cards, even. However, some people, namely the NSA have shown that they can in fact hack it, without really disclosing how.
Without further ado, let’s get into the good stuff!
2 – Onion routing involves a lot of encryption – layered like an onion
This is the main tech principle behind this tech, so let me try to explain it with an analogy.
Suppose Alice and Bob want to send messages to each other, but they don’t want anyone to know it’s from them to each other (for “Romeo and Juliet” reasons, or whatever).
What they have however is a nice network of friends, like the one I’m trying to get on Steemit! And a lot of creativity, which I sadly don’t really have :(
So, Alice takes a message she wants to send to Bob, and writes it in a code that she knows only her and some other friend can understand. Then, cuz she’s crazy prepared, she wraps it in many layers of pieces of paper, each of which with a message on it, with a code only another friend can figure out.
She hands the monstrosity she created to Mary. Mary, the good friend, reads the first piece of paper, deciphers the code, and it says “Take this paper for yourself, give the rest to Luke.”. She even tries to read the rest (not such a good friend) but can’t understand diddly squat, because it’s in a code she doesn’t get.
She hands it to Luke, who then deciphers his part of the code, and reads “Take this paper and give the rest to Sarah”. He does. Sarah then deciphers the next code, reads the note, and hands it off to Mike. Then a lot of other people, until it gets to Bob.
Notice how if you’d asked Mike, he couldn’t tell you where this chain of messages started, nor who the final target was.
That’s basically how Tor works. Every “person” (let’s call them nodes) in this metaphor could only tell you who gave them the message, and who they passed it too.
This is how Tor preserves your anonymity.
3 – Tor helps a lot of people remain private online, for good…”
Did you see me list off why anonymity online is a good thing, in my VPN article?
Anonymity online can have a great impact on society. The vast majority of Tor users are, in fact, normal people, who simply don’t want to get tracked online.
Haven’t you ever been a little creeped out how Google already knows your native language? And your location? Tor allows people to get around that.
Furthermore, journalists and activists, who want to transmit sensitive info online often use this technology. Panama Papers would never have happened without this kind of technology. Whistleblowers all around the world can rest easy knowing that this technology will save them from a very bad fate if they were to be spied on and caught for oppressive government.
…but we all know that’s not the whole story.
4 – …and for bad
There is some very bad publicity around this technology.
You’ve likely heard of Tor spoken of as a tool of cyber-criminals, and overall, very bad people.
Indeed, it’s privacy granting powers mean that this tech is often use by criminals to cover their tracks and keep them safe. It doesn’t help that the Dark Web, a haven for criminal activity, runs on this technology.
…and child pornography is a spine-chilling, and disgusting way for such a noble-spirited tech to end up used for.
Despite that, I maintain that Tor’s relevance will only increase as time goes on. And as I’ve mentioned before, now that the NSA has shown itself capable of piercing this technology (through means we don’t yet know), it’s criminal usage is bound to decrease. It will eventually return to being used the right way, by honest people, who simply exercise their deserved right of privacy.
That wraps this up!
Hope you liked this article! Tomorrow, if I'm able, I’ll cap off this week by posting an article about how the Deep Web works!
Feel free to ask me any question, or make any criticism you want to make :)
Steem on guys!
Very nice post @sirlordboss, upvoted. Readers if you like this post you might also like - Top 5 Hacking Techniques And Their Prevention. Stay Safe Online.
Thanks for the support man!
I like your article as well, but in case you don't already know, promoting your posts in someone else's is a bit frowned upon... It's okay by me, but someone else might be angry. just some advice :)
exactly
@sirlordboss
Be aware that tor is not 100% secure since the FBi or the CIA was able to own a certain number of relay nodes that would allow them to watch the traffic flow and they could relate the entry and exit points to the real addresses but great post and tor has launched a bug bounty program so that might help in some issues
And also you shouldn't use google with tor use duck duck go it keeps the trackers away.
I explained almost all of this in my first post in steem feel free to check it if your into security and privacy
https://steemit.com/technology/@hallow/online-privacy-and-anonymity-basic-guide-1
I am aware! I mention at the start that the NSA has publibly admitted that they can hack this technology...
But you suggestions are great and your post is very good :)
...e é bom ver outro tuga por aqui ;)
ahahah ya sinceramente nao esperava encontrar nenhum mas acho que ja conheço dois ou tres xD
Thank you @sirlordboos - I wonder, though - do we still need VPN's if we use TOR?
And is TOR "just another browser" with the addition that it's private - or would I accidentally "see" some of the bad stuff? People told me they've seen horrible things, but I thought, well, don't go looking for them then. Or are you exposed to stuff you don't want to see? I imagine Tor like simply another browser that I can use Steemit, Facebook or Google from, if I choose to - is that correct?
I really appreciate thought-provoking and informative posts like this and I look forward to seeing more of your content in the future. Hoping we can connect and continue to evolve and learn from each other! Remember, be yourself, because nobody else does it better -- Full #Steem ahead @sirlordboss
Would you consider Tor to be a good analogy for helping to explain Blockchain?
Much ❤
@Tayken
A lot of great information here.
But I believe I read somewhere a few months ago that installing and running TOR on your computer is all the probable cause that Law Enforcement in the US needs to secure a search warrant.
The key thing to remember is that very term, "Enforcement".
"Protect and Serve" no longer exists as a part of their mission statement.
Good read.
Thanks :D
Hi @sirlordboss,
This gem of a post was discovered by the OCD Team!
Reply to this comment if you accept, and are willing to let us share your gem of a post! By accepting this, you have a chance to receive extra rewards and one of your photos in this article may be used in our compilation post!
You can follow @ocd – learn more about the project and see other Gems! We strive for transparency.
Let me know if you have any questions on the project or nomination. Hope to hear from you soon! Steem On!
Regards,
@cem
How I wish I had seen this before I went on vacation :(
Well, I would have accepted xD
I'll try to deliver more content like this regularly from now on :)