Formation | December 22, 2006 |
---|---|
Founders | |
Type | 501(c)(3) |
20-8096820 | |
Purpose | To advance human rights and freedoms by creating and deploying free and open source anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding. [1] |
Headquarters | Winchester, Massachusetts, U.S. |
Products | |
Executive Director | Isabela Bagueros [2] |
Revenue | $5,999,891 [3] (2021) |
Expenses | $4,853,334 [3] (2021) |
Website |
|
The Tor Project, Inc. is a 501(c)(3) research-education [4] nonprofit organization based in Winchester, Massachusetts. [5] It is founded by computer scientists Roger Dingledine, Nick Mathewson, and five others. The Tor Project is primarily responsible for maintaining software for the Tor anonymity network. [6]
The Tor Project, Inc. was founded on December 22, 2006 [5] by computer scientists Roger Dingledine, Nick Mathewson and five others. The Electronic Frontier Foundation (EFF) acted as the Tor Project's fiscal sponsor in its early years, and early financial supporters of the Tor Project included the U.S. International Broadcasting Bureau, Internews, Human Rights Watch, the University of Cambridge, Google, and Netherlands-based Stichting NLnet. [7] [8] [9] [10] [11] [12]
In October 2014, the Tor Project hired the public relations firm Thomson Communications in order to improve its public image (particularly regarding the terms "Dark Net" and "hidden services") and to educate journalists about the technical aspects of Tor. [13]
In May 2015, the Tor Project ended the Tor Cloud Service. [14] [15]
In December 2015, the Tor Project announced that it had hired Shari Steele, former executive director of the Electronic Frontier Foundation, as its new executive director. Roger Dingledine, who had been acting as interim executive director since May 2015, remained at the Tor Project as a director and board member. [16] [17] [18] Later that month, the Tor Project announced that the Open Technology Fund would be sponsoring a bug bounty program that was coordinated by HackerOne. [19] [20] The program was initially invite-only and focuses on finding vulnerabilities that are specific to the Tor Project's applications. [19]
On May 25, 2016, Tor Project employee Jacob Appelbaum stepped down from his position; [21] [22] [23] this was announced on June 2 in a two-line statement by Tor. [24] Over the following days, allegations of sexual mistreatment were made public by several people. [23]
On July 13, 2016, the complete board of the Tor Project – Meredith Hoban Dunn, Ian Goldberg, Julius Mittenzwei, Rabbi Rob Thomas, Wendy Seltzer, Roger Dingledine and Nick Mathewson – was replaced with Matt Blaze, Cindy Cohn, Gabriella Coleman, Linus Nordberg, Megan Price and Bruce Schneier. [25] [26] [27] [28] A new anti-harassment policy has been approved by the new board, as well as a conflicts of interest policy, procedures for submitting complaints, and an internal complaint review process. [29] [30] The affair continues to be controversial, with considerable dissent within the Tor community. [31]
In 2020, due to the COVID-19 pandemic, the Tor project's core team let go of 13 employees, leaving a working staff of 22 people. [32]
In 2023, the Tails Project approached the Tor Project to merge operations. The merger was completed on September 26, 2024, stating that, "By joining forces, the Tails team can now focus on their core mission of maintaining and improving Tails OS, exploring more and complementary use cases while benefiting from the larger organizational structure of The Tor Project." [33] [34]
As of 2012 [update] , 80% of the Tor Project's $2 million annual budget came from the United States government, with the U.S. State Department, the Broadcasting Board of Governors, and the National Science Foundation as major contributors, [35] "to aid democracy advocates in authoritarian states". [36] The Swedish government and other organizations provided the other 20%, including NGOs and thousands of individual sponsors. [10] [37] Dingledine said that the United States Department of Defense funds are more similar to a research grant than a procurement contract. Tor executive director Andrew Lewman said that even though it accepts funds from the U.S. federal government, the Tor service did not collaborate with the NSA to reveal identities of users. [38]
In June 2016, the Tor Project received an award from Mozilla's Open Source Support program (MOSS). The award was "to significantly enhance the Tor network's metrics infrastructure so that the performance and stability of the network can be monitored and improvements made as appropriate." [39]
In March 2011, the Tor Project received the Free Software Foundation's 2010 Award for Projects of Social Benefit. The citation read, "Using free software, Tor has enabled roughly 36 million people around the world to experience freedom of access and expression on the Internet while keeping them in control of their privacy and anonymity. Its network has proved pivotal in dissident movements in both Iran and more recently Egypt." [43]
In September 2012, the Tor Project received the 2012 EFF Pioneer Award, along with Jérémie Zimmermann and Andrew Huang. [44]
In November 2012, Foreign Policy magazine named Dingledine, Mathewson, and Syverson among its Top 100 Global Thinkers "for making the web safe for whistleblowers". [45]
In 2014, Roger Dingledine, Nick Mathewson and Paul Syverson received the USENIX Test of Time Award for their paper titled "Tor: The Second-Generation Onion Router", which was published in the Proceedings of the 13th USENIX Security Symposium, August 2004. [46]
In 2021, the Tor Project was awarded the Levchin Prize for real-world cryptography. [47]
A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a database of instructions on how to return messages to the real user. These instructions usually involve the anonymous remailer network itself, thus protecting the true identity of the user.
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series of network nodes called "onion routers," each of which "peels" away a single layer, revealing the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. While onion routing provides a high level of security and anonymity, there are methods to break the anonymity of this technique, such as timing analysis.
The Free Haven Project was formed in 1999 by a group of Massachusetts Institute of Technology students with the aim to develop a secure, decentralized system of data storage. The group's work led to a collaboration with the United States Naval Research Laboratory to develop Tor, funded by DARPA.
.onion is a special-use top-level domain name designating an anonymous onion service, which was formerly known as a "hidden service", reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the Tor network.
Vuze is a BitTorrent client used to transfer files via the BitTorrent protocol. Vuze is written in Java, and uses the Azureus Engine. In addition to downloading data linked to .torrent files, Azureus allows users to view, publish and share original DVD and HD quality video content. Content is presented through channels and categories containing TV shows, music videos, movies, video games, series and others.
Jacob Appelbaum is an American independent journalist, computer security researcher, artist, hacker and teacher. Appelbaum, who earned his PhD from the Eindhoven University of Technology, first became notable for his work as a core member of the Tor Project, a free software network designed to provide online anonymity. But it was Appelbaum's work with WikiLeaks and his journalism at Der Spiegel based on the NSA documents leaked by Edward Snowden that made him famous, status accentuated by his standing-in for Julian Assange at computer security and hacker forums when Assange could no longer travel to the United States. Under the pseudonym "ioerror", Appelbaum was an active member of the Cult of the Dead Cow hacker collective from 2008 to 2016. He was the co-founder of the San Francisco hackerspace Noisebridge with Mitch Altman. He worked for Kink.com and Greenpeace and volunteered for the Ruckus Society and the Rainforest Action Network. He was on the Technical Advisory Board of the Freedom of the Press Foundation.
Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.
Noisebridge is an anarchistic maker and hackerspace located in San Francisco. It is inspired by the European hackerspaces Metalab in Vienna and c-base in Berlin. Noisebridge describes itself as "a space for sharing, creation, collaboration, research, development, mentoring, and learning". Outside of its headquarters, Noisebridge forms a wider international community. It was organized in 2007 and has had permanent facilities since 2008.
Tails, or "The Amnesic Incognito Live System", is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity against surveillance. It connects to the Internet exclusively through the anonymity network Tor. The system is designed to be booted as a live DVD or live USB and never writes to the hard drive or SSD, leaving no digital footprint on the machine unless explicitly told to do so. It can also be run as a virtual machine, with some additional security risks.
UltraSurf is a closed-source freeware Internet censorship circumvention product created by UltraReach Internet Corporation. The software bypasses Internet censorship and firewalls using an HTTP proxy server, and employs encryption protocols for privacy.
Mozilla is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, publishes and supports Mozilla products, thereby promoting exclusively free software and open standards, with only minor exceptions. The community is supported institutionally by the non-profit Mozilla Foundation and its tax-paying subsidiary, the Mozilla Corporation.
Flash proxy is a pluggable transport and proxy which runs in a web browser. Flash proxies are an Internet censorship circumvention tool which enables users to connect to the Tor anonymity network via a plethora of ephemeral browser-based proxy relays. The essential idea is that the IP addresses contingently used are changed faster than a censoring agency can detect, track, and block them. The Tor traffic is wrapped in a WebSocket format and disguised with an XOR cipher.
Whonix is a Linux distribution, based on Kicksecure OS, claimed to be security hardened by its developers.
Caspar Pemberton Scott Bowden was a British privacy advocate, formerly a chief privacy adviser at Microsoft. Styled as "an independent advocate for information privacy rights, and public understanding of privacy research in computer science", he was on the board of the Tor anonymity service. and a fellow of the British Computer Society. Having predicted US mass surveillance programmes such as PRISM from open sources, he gathered renewed attention after the Snowden leaks vindicated his warnings.
Roger Dingledine is an American computer scientist known for having co-founded the Tor Project. A student of mathematics, computer science, and electrical engineering, Dingledine is also known by the pseudonym arma. As of December 2016, he continues in a leadership role with the Tor Project, as a project Leader, Director, and Research Director.
Mullvad is a commercial VPN service based in Sweden. Launched in March 2009, Mullvad operates using the WireGuard and OpenVPN protocols. It also supports Shadowsocks as a bridge protocol for censorship circumvention. Mullvad's VPN client software is released under the GPLv3, a free and open-source software license.
The Update Framework (TUF) is a software framework designed to protect mechanisms that automatically identify and download updates to software. TUF uses a series of roles and keys to provide a means to retain security, even when some keys or servers are compromised. It does this with a stated goal of requiring minimal changes and effort from repository administrators, software developers, and end users. In this way, it protects software repositories, which are an increasingly desirable target for hackers.
torservers.net is an independent network of non-profit organisations that provide nodes to the Tor anonymity network. The network was started in June 2010 by German privacy activist and advocate Moritz Bartl (Q105485101) and currently transfers up to 7.4 GB/s (~59.2 Gb/s) of exit node traffic as of May 2022.
Nick Mathewson is an American computer scientist and co-founder of The Tor Project. He, along with Roger Dingledine, began working on onion routing shortly after they graduated from Massachusetts Institute of Technology (MIT) in the early 2000s. He is also known by his pseudonym nickm. Mathewson and Dingledine were the focus of increased media attention after the leak of NSA's highly classified documents by Edward Snowden, and the subsequent public disclosure of the operation of XKeyscore, which targeted one of The Tor Project's onion servers along with Mixminion remailer which are both run at MIT.
Snowflake is a software package for assisting others in circumventing internet censorship by relaying data requests. Snowflake proxy nodes are meant to be created by people in countries where Tor and Snowflake are not blocked. People under censorship then use a Snowflake client, packaged with the Tor Browser or Onion Browser, to access the Tor network, using Snowflake relays as proxy servers. Access to the Tor network can in turn give access to other blocked services. A Snowflake proxy can be created by either installing a browser extension, installing a stand-alone program, or browsing a webpage with an embedded Snowflake proxy. The proxy runs whenever the browser or program is connected to the internet.