What Is the Tor Network?

IntermediateJan 19, 2023
A Peer-to-Peer Network that protects your privacy
What Is the Tor Network?

People exchange information on the Internet from all across the world. The open Internet often comes at the cost of users’ privacy and security. Many service providers mine people’s data and commercialize it for target advertisements. Data security concerns have made people consider using networks that guarantee privacy.

The Tor network addresses this concern by providing users with entirely anonymous access to the internet based on a peer-to-peer network.

What Is the Tor Network?

The Tor network is a free, open-source network that allows users to access the internet anonymously by routing their connections through a series of intermediate servers, known as “nodes.” When using the Tor network, a user’s internet activity cannot be traced back to their device, as the data is encrypted and passed through multiple nodes, each of which only knows the IP address of the previous and next nodes in the circuit. This makes it difficult for anyone to track the origin or destination of the data.

The objective of the Tor network is to offer greater privacy by remaining hidden from search engines such as Google when users browse through this network.
The Tor network was initially developed by the U.S. Navy and is now maintained by the Tor Project, a non-profit organization whose primary goal is to research and develop online privacy tools. It is used by a variety of individuals and organizations, including journalists, law enforcement agencies, whistleblowers, and individuals living in countries with censors.

In the standard web browser and network, you surf the Net with your computer directly connected to the internet servers. This direct connection implies that the route is straight and simple. Anyone monitoring your internet connection could quickly discover the IP addresses of both you and the servers and deduce that you were communicating with each other.

A secure website using https on the mainstream web browser will serve to encrypt the content of your message but not your identity. The fact that the communication route can be traced to you and the server or person you are interacting with is enough to track your browsing habit, data, and identity, which could be used for untoward purposes.

How Does the Tor Network Work?

To access the Tor network, users can download the Tor Browser, a modified version of the Firefox browser with added security features. When using the Tor Browser, all traffic between the browser and the Tor network is encrypted, and the final node, or “exit node,” communicates with the destination server outside the network via an unencrypted link. This allows users to access the internet anonymously and securely.

The Tor network works in such a way that it effectively covers your trace online. The network sends connections from your computer or device to the final destination through several intermediate servers. These servers, at least three in a session, are known as “nodes.” Tor protects your anonymity by re-encrypting your data each time it passes through a node. Each node only recognizes the IP addresses in front of and behind them. The steps involved can be broken down as follows:

  1. When you attempt to connect to a server using Tor, your browser establishes an encrypted connection with a Tor server. It also creates a circuit or path through the Tor network. This arbitrary path sends traffic through several Tor servers known as nodes and changes every 10 minutes.
  2. Once the network path is established, communications are routed from one server to another. On the network chain, each server only knows the server from which it received the data and the next server to send that data. None of the servers in this circuit would know the complete traffic path through the network. Tor avoids revealing where the traffic originated and where it is headed.
  3. Tor uses a layering scheme to encrypt traffic, giving rise to the Onion concept. For example, as traffic passes through the Tor network’s nodes, a layer of encryption is removed at each node, resembling the layers of an onion.
  4. All traffic between the Tor browser and the Tor network is encrypted when using the Tor browser. It is sent anonymously through the network, and the final node, or “exit node,” communicates with the destination server outside the Tor network via an “Unencrypted” link.

As a result, no one can deduce the full path of your data. Data transfer between your computer and the website to which you are attempting to connect.

Who Uses the Tor Network?

People use the Tor network for various reasons. It is commonly used among journalists, law enforcement agencies, whistleblowers, and people in countries with censorship.

  1. Journalists: Journalists and bloggers who want to protect their online privacy and security can use Tor software. Reporters Without Borders has advised journalists to use Tor to keep their identities hidden. Most journalists in countries where internet censorship is severe use Tor to write news and articles that promote social change and political reform.

  2. Law enforcement agents: Anonymous internet access enables law enforcement to carry out covert operations. They may lose coverage if the communications, including connections from government, law enforcement, or police IP addresses, are routed through a normal network.

  3. Activists and Whistleblower: Many human rights activists report abuses from dangerous zones anonymously using Tor because it is legal and does not guarantee safety.

  4. Celebrities: Many celebrities use Tor to shield themselves from their profession’s spotlight. Tor allows celebrities and high-profile individuals to express themselves online without fear of repercussions to their public roles.

In addition to journalists, law enforcement agencies, whistleblowers, and individuals living in countries with censorship, the Tor network is also used by a variety of other individuals and organizations.

  1. Cryptocurrency users: As we can see in the next paragraph, the anonymity provided by the Tor network makes it popular among cryptocurrency users, particularly those who want to protect their privacy while buying and selling virtual currencies.

  2. Activists and protestors: The anonymity provided by the Tor network can be particularly useful for activists and protestors who may be operating in dangerous or repressive environments. By using Tor, they can communicate and organize without fear of reprisals.

  3. Regular internet users: The Tor network is not just used by specialized groups or individuals with specific needs. It is also popular among regular internet users who are concerned about protecting their identity and privacy online. Some people use the Tor network to access information that may be blocked by their government or internet service provider.

  4. Individuals with high-profile public roles: Celebrities and other high-profile individuals may use the Tor network to express themselves online without fear of repercussions to their public roles.

Tor in the Cryptocurrency Ecosystems


source: Pixabay.com

The Tor network is popular among cryptocurrency users for its ability to provide anonymity. This is particularly useful for those who want to protect their privacy while buying and selling virtual currencies. Some cryptocurrency exchanges and marketplaces can only be accessed through the Tor network, as they are designed to protect the anonymity of their users. If a user buys a ticket using Bitcoin on the Tor network, no one will be able to check his IP address, thereby creating an extra layer of privacy and anonymity. This promise of security has made cryptocurrencies like Zcash utilize the TOR network to further anonymize the networking part of their transactions. As early as 2015, the Bitcoin core project also integrated Tor services to their core network daemon.

Advantages of Using the Tor Network

  • It protects your data and keeps internet activities private from websites and advertisers
  • It addresses cyber-spying concerns by safeguarding your anonymity
  • It is used to circumvent hostile government censorship
  • It provides a shield against surveillance
  • It ensures maximum privacy over the Internet

Disadvantages of Using the Tor Network

  • Connection to the TOR network could be very slow.
  • It may create a false sense of security where an unsuspecting user may install plugins that will bypass Tor and harm his identity or use Tor to create an account on a website that will not make him hidden.
  • The exit node decrypts the final data, which can cause harm if Tor is used on an unencrypted web page.
  • All requests come through one node in the Tor network.

Conclusion

Privacy and data protection are matters of critical concern for users in this age of free-flowing data. Sometimes, they become top priorities to keep safe from prying eyes that may want to track your browsing habits for some targeted actions.
While the Tor network provides a high level of anonymity, it is not completely foolproof. Users should be aware that certain actions, such as downloading large files or accessing certain websites, can potentially compromise their anonymity. Additionally, the network may be slower than a traditional internet connection due to the added steps involved in routing connections through the network. Overall, the Tor network, which is free and serves a purpose similar to VPN but through a different approach, is a valuable tool for individuals and organizations that value privacy and want to protect their data from being tracked and exploited.

Author: Mayowa
Translator: Yuanyuan
Reviewer(s): Matheus, Ashley, Joyce, Edward, Piero
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.io.
* This article may not be reproduced, transmitted or copied without referencing Gate.io. Contravention is an infringement of Copyright Act and may be subject to legal action.