Tor (anonymity network) Browser and Darkweb

Tor (anonymity network) Browser and Darkweb

Developer(s) The Tor Project, Inc
Initial release 20 September 2002[1]
Stable release[2] (1 March 2017; 14 days ago) [±][3] (3 March 2017; 12 days ago) [±][3] (3 March 2017; 12 days ago) [±][3] (3 March 2017; 12 days ago) [±][3] (3 March 2017; 12 days ago) [±][3] (3 March 2017; 12 days ago) [±]

Preview release[4] (1 March 2017; 14 days ago) [±]
Development status Active
Written in C,[5] Python
Operating system
Size 2–4 MB
Type Onion routing, Anonymity
License Original BSD

Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name “The Onion Router”.[6][7] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[8] to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”.[9] Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

An adversary might try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user’s computer.[10] The NSA had a technique that targets a vulnerability – which they codenamed “EgotisticalGiraffe” – in an outdated Firefox browser version at one time bundled with the Tor package,[11] and in general, targets Tor users for close monitoring under its XKeyscore program.[12] Attacks against Tor are an active area of academic research,[13][14] and are welcomed by the Tor Project itself.[15]


About Koan

Look ISIS (ISIL/IS) or Islamic State or Daesh, Al Qaeda, Islam and Muslims are now in the Indigenous Peoples of Latin America like Southern Mexico, Guatemala, Central America Northern Triangle, Panama Canal, Colombia, Andes, Amazon, Guyanas, Triple Border Region and Patagonia. Southern Mexico is now the land of the Mayan Muslims. Islam is now the religion and will become an official religion in Chiapas, Mexico. Muslim groups and peoples from all over the world will come to Chiapas and intermarry with the local Maya tribes. The vengeance of the Maya with the help of Islam and groups like ISIS will wreck havoc on Mexico, Central America and the United States of America. Jews will never be safe in America anymore. Also the Indigenous Native Americans with United States, Canada, Caribbean, Greenland and the other native tribes of Latin America will embrace Islam too. But also the Indigenous Peoples in Europe like the Sami (Laplander) People in the Lapland Scandinavia and the Indigenous Roma / Romani (Gypsy) People of the Balkans. The Ainu and Ryukyu (Okinawan) in Japan. The Papuans of Papua New Guinea. The Mansi and Yakut in Russia. The Aborigines in Australia. The Maoris and Polynesians in New Zealand and the Pacific Islands in the year 2020 to 2070 (1500 in the Muslim Calendar).
This entry was posted in Uncategorized and tagged , , , , , , , , , , , , , , , , . Bookmark the permalink.