{"id":1686,"date":"2013-04-22T09:55:50","date_gmt":"2013-04-22T13:55:50","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=1686"},"modified":"2020-02-26T10:38:27","modified_gmt":"2020-02-26T15:38:27","slug":"what-is-tor","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/what-is-tor\/1686\/","title":{"rendered":"What Is Tor?"},"content":{"rendered":"<p>The privacy and censorship conscious among us are certainly familiar with Tor.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/04\/06051052\/tor_blog_title.jpg\"><img decoding=\"async\" class=\"size-full wp-image-1689 aligncenter\" alt=\"tor\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/04\/06051052\/tor_blog_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>Short for \u201cThe Onion Router,\u201d Tor is a free tool that keeps a user\u2019s <span style=\"color: #333399;\"><a href=\"http:\/\/www.securelist.com\/en\/blog\/208193624\/Who_is_attacking_me\" target=\"_blank\" rel=\"noopener nofollow\"><span style=\"color: #333399;\">Web browsing<\/span><\/a> <\/span>private and anonymous. Beyond those with personal privacy or censorship concerns, Tor has been a valuable tool for those in oppressed parts of the world helping activists and others reach parts of the Internet they otherwise would not be able to.<\/p>\n<p>Tor is available as a free download for your PC; it also stands for the Tor network, which is made up of voluntary Tor users worldwide. It\u2019s through this network where Tor users\u2019 Internet traffic is directed in order to conceal the user\u2019s location.<\/p>\n<p>In parts of the world where <span style=\"color: #333399;\"><a href=\"https:\/\/www.kaspersky.com\/blog\/skype-government-surveillance\/\" target=\"_blank\" rel=\"noopener nofollow\"><span style=\"color: #333399;\">surveillance<\/span><\/a><\/span> is conducted over the Internet or by analyzing network traffic, Tor is an important piece of software to preserve anonymity online.<\/p>\n<p>Tor organizers point to a number of use cases for the software and network, including reaching sites or services online that are blocked by local Internet service providers, keeping sensitive communication anonymous\u2013for example between crisis counselors and patients in the medical community, between journalists and their sources, or non-governmental organization (NGO) volunteers wishing to preserve their anonymity in countries hostile to their cause.<\/p>\n<p>Tor\u2019s strength is in its numbers, the organization said. \u201cThe variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the others users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected,\u201d the Tor website says.<\/p>\n<div class=\"pullquote\">Tor hides you among the others users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.<\/div>\n<p><b>Tor Maintains Anonymity, Safety<\/b><\/p>\n<p>If you\u2019re in parts of the world where surveillance via traffic analysis of source and destination is the norm, then Tor can maintain not only your privacy and anonymity, but your safety. \u00a0Rather than examine the content of an email message or Web pages, analyzing header information is of much more value to someone analyzing traffic. For example, headers will reveal source location, time sent and much more about a message of a browsing session, all of which can be seen by the recipient or anyone intercepting the packets in question. More sophisticated tracking methods can even render encryption rather ineffective because scrambling message content, for example, doesn\u2019t change header information.<\/p>\n<p>Tor remedies that problem.<\/p>\n<p>\u201cThe idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you \u2014 and then periodically erasing your footprints,\u201d according to the Tor website. \u201cInstead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it\u2019s going.\u201d<\/p>\n<p><b>A Tor How-To<\/b><\/p>\n<p>Here\u2019s how Tor works:<\/p>\n<ul>\n<li>Your Tor client software will contact the Tor directory server and receive a random list of Tor nodes.<\/li>\n<li>The client then selects a random path to the destination, encrypting each hop along the way.<\/li>\n<li>The hops in between know only where the previous hop came from and where it sent the packets to the next hop in the chain.<\/li>\n<li>The complete path is never known by an individual node on the chain, and separate encryption keys are generated along the way for the same purposes.<\/li>\n<li>And by the way, these completed circuits have a shelf life of 10 minutes, and then new random paths are selected.<\/li>\n<\/ul>\n<p>Like many other security tools such as Metasploit and Nessus, though they may be designed for good, there\u2019s nothing keeping attackers and oppressors from using Tor to their advantage as well. Criminals have taken advantage of Tor for their own purposes such as hiding illicit or illegal communications and online storefronts, to hampering <span style=\"color: #333399;\"><a href=\"https:\/\/www.kaspersky.com\/blog\/inside-cybercrime-investigations\/\" target=\"_blank\" rel=\"noopener nofollow\"><span style=\"color: #333399;\">criminal investigations<\/span><\/a><\/span> by anonymizing communication between criminal parties.<\/p>\n<p>Tor, however, remains a vital privacy tool that\u2019s been endorsed by a number of activists and civil liberties groups. For those with privacy or censorship concerns, Tor provides a safe haven online that protects not only your Web activities, but in some extreme cases, can help protect your personal well-being.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The privacy and censorship conscious among us are certainly familiar with Tor. Short for \u201cThe Onion Router,\u201d Tor is a free tool that keeps a user\u2019s Web browsing private and<\/p>\n","protected":false},"author":12,"featured_media":1690,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1278,43],"class_list":{"0":"post-1686","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-browsers","9":"tag-privacy"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-is-tor\/1686\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-is-tor\/1686\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-is-tor\/1686\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-is-tor\/1686\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-is-tor\/1686\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what-is-tor\/718\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-is-tor\/1686\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-is-tor\/1686\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1686"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1686\/revisions"}],"predecessor-version":[{"id":32741,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1686\/revisions\/32741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1690"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}