Tor: “is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name “The Onion Router”.”
Tor, probably the most famous proxy of all time. I’m gonna try my best to explain in detail how Tor works and why it’s a double edged sword. I claim no responsibility if you get caught while using Tor.
Tor’s original purpose can be read on the wikipedia site dedicated to Tor:
“Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”. Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.”
But as we all know, Tor is a double-edged sword in so many ways. One such example is the Dark Web. If you want to read up on the Dark Web please click this link:
Tor is (in my opinion) very interesting on how it works keeping anonymity. Remember what Shrek said? Ogres are like onion, they have layers. The same concept can be applied with Tor. what happens is that with each individual “hop” the Ip address is encrypted, and the data, multiple times. Sending the encrypted data through multiple virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. Thus like a onion each layer is partially peeled off, the final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. A bit more detail can be seen in this paragraph:
“Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.”
Now the NSA claims to have cracked Tor and I believe them because as with my last “tutorial”, nothing is one-hundred percent anonymous. Don’t rely on Tor to hide your Ip address completely. Instead, try combining Tor with a VPN and proxies, hence creating multiple “locations” which you may or may not be at. I’m saying, don’t be a idiot and rely on one tool to get the job done.
If you want to download Tor (browser) the link is:
and a good source for reading up on Tor is:
And that’s that for this article.