Tor2web

Last updated

Tor2web
Original author(s) Aaron Swartz, Virgil Griffith
Developer(s) Hermes Center for Transparency and Digital Human Rights
Initial release24 October 2008 (2008-10-24) [1]
Final release
3.2.0 / 1 October 2019;5 years ago (2019-10-01)
Written in Python
Operating system Linux, Tails
License Affero General Public License
Website www.tor2web.org

Tor2web (pronounced "Tor to Web") is a software project to allow Tor hidden services to be accessed from a standard browser without being connected to the Tor network. It was created by Aaron Swartz and Virgil Griffith. [2]

Contents

History

Tor is a network which enables people to use the Internet anonymously (though with known weaknesses) and to publish content on "hidden services", which exist only within the Tor network for security reasons and thus are typically only accessible to the relatively small number of people using a Tor-connected web browser. Aaron Swartz and Virgil Griffith developed Tor2web in 2008 as a way to support whistleblowing and other forms of anonymous publishing through Tor, allowing materials to remain anonymous while making them accessible to a broader audience. [1] [3] In an interview with Wired Swartz explained that Tor is great for anonymous publishing, but because its focus is not user-friendliness and thus not many people would install it, he wanted to "produce this hybrid where people could publish stuff using Tor and make it so that anyone on the internet could view it". [2]

The software developed by Swartz and Griffith is today considered version 1.0. Since then, it has been maintained and developed by Giovanni Pellerano from the Hermes Center for Transparency and Digital Human Rights as part of the GlobaLeaks Project, with financial support from the Open Technology Fund. Version 2.0 was released in August 2011, and version 3.0 is in beta as of December 2014. [4]

Operation and security

Rather than typical top-level domains like .com, .org, or .net, hidden service URLs end with .onion and are only accessible when connected to Tor. Tor2web acts as a specialized proxy or middleman between hidden services and users, making them visible to people who are not connected to Tor. To do so, a user takes the URL of a hidden service and replaces .onion with .onion.to.

Like Tor, Tor2web operates using servers run voluntarily by an open community of individuals and organizations.

Tor2web preserves the anonymity of content publishers but is not itself an anonymity tool and does not offer any protection to users beyond relaying data using HTTP Secure (HTTPS). Since version 2.0, a privacy and security warning is added to the header of each web page it fetches, encouraging readers to use the Tor Browser to obtain anonymity.

See also

Related Research Articles

<span class="mw-page-title-main">Proxy server</span> Computer server that makes and receives requests on behalf of a user

In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and possibly performance in the process.

<span class="mw-page-title-main">Onion routing</span> Technique for anonymous communication over a computer network

Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series of network nodes called "onion routers," each of which "peels" away a single layer, revealing the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. While onion routing provides a high level of security and anonymity, there are methods to break the anonymity of this technique, such as timing analysis.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard web search-engine programs. This is in contrast to the "surface web", which is accessible to anyone using the Internet. Computer scientist Michael K. Bergman is credited with inventing the term in 2001 as a search-indexing term.

A darknet or dark net is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks, and anonymity proxy networks such as Tor via an anonymized series of connections.

<span class="mw-page-title-main">Java Anon Proxy</span> Anonymity network

Java Anon Proxy (JAP) also known as JonDonym, was a proxy system designed to allow browsing the Web with revocable pseudonymity. It was originally developed as part of a project of the Technische Universität Dresden, the Universität Regensburg and Privacy Commissioner of the state of Schleswig-Holstein. The client-software is written in the Java programming language. The service has been closed since August 2021.

<span class="mw-page-title-main">.onion</span> Pseudo–top-level internet domain

.onion is a special-use top-level domain name designating an anonymous onion service, which was formerly known as a "hidden service", reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the Tor network.

xB Browser Web browser designed to run on both the Tor and XeroBank anonymity networks

xB Browser was a web browser designed to run on both the Tor and XeroBank anonymity networks, and is available as component of the xB Machine and the xB Installer.

<span class="mw-page-title-main">Tribler</span> Peer-to-peer filesharing software and protocol

Tribler is an open source decentralized BitTorrent client which allows anonymous peer-to-peer by default. Tribler is based on the BitTorrent protocol and uses an overlay network for content searching. Due to this overlay network, Tribler does not require an external website or indexing service to discover content. The user interface of Tribler is very basic and focused on ease of use instead of diversity of features. Tribler is available for Linux, Windows, and OS X.

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information such as IP addresses. Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header. Commercial anonymous proxies are usually sold as VPN services.

<span class="mw-page-title-main">TorChat</span> Anonymous instant messaging application

TorChat was a peer-to-peer anonymous instant messenger that used Tor onion services as its underlying network. It provided cryptographically secure text messaging and file transfers. The characteristics of Tor's onion services ensure that all traffic between the clients is encrypted and that it is very difficult to tell who is communicating with whom and where a given client is physically located.

xB Machine is a discontinued virtual operating system that is small enough to fit on a USB drive. The last version seems to have been 0.9.1.5 in mid-2008. It brought a secure computing environment that anonymized all internet activity, and had portable encrypted file storage. It had been developed and offered by XeroBank and based on a modified Gentoo Linux distribution. It could be executed as a virtual machine through a QEMU hypervisor, VMWare, VirtualBox, and any other major virtualization system. It could also be booted from on USB or burned to CD for booting. Virtualization, along with the native implementation of a Tor onion routing for internet connectivity and other encryption and privacy tools, had been utilized to increase the security and anonymity of the user. The developers claimed that it is the most secure operating system in the world and that the technology involved is highly resistant to hacking and spying, even in the most hostile environments. The details and transactions inside each xB Machine account were protected with 256-bit AES encryption. The software also had a self-destruct sequence for eliminating any traces that a user may have left behind on the drivespace after using xB Machine. Meanwhile, Xerobank offers a modular package with xB Browser, xB Mail, and xB VPN, parts of it running only for customers of the bank.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.

Internet censorship circumvention is the use of various methods and tools to bypass internet censorship.

<span class="mw-page-title-main">Tor Mail</span> Defunct Tor email service

Tor Mail was a Tor hidden service that went offline in August 2013 after an FBI raid on Freedom Hosting. The service allowed users to send and receive email anonymously to email addresses inside and outside the Tor network.

<span class="mw-page-title-main">SecureDrop</span> Free software platform

SecureDrop is a free software platform for secure communication between journalists and sources (whistleblowers). It was originally designed and developed by Aaron Swartz and Kevin Poulsen under the name DeadDrop. James Dolan also co-created the software.

The dark web is the World Wide Web content that exists on darknets that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.

<span class="mw-page-title-main">Roger Dingledine</span> American computer scientist

Roger Dingledine is an American computer scientist known for having co-founded the Tor Project. A student of mathematics, computer science, and electrical engineering, Dingledine is also known by the pseudonym arma. As of December 2016, he continues in a leadership role with the Tor Project, as a project Leader, Director, and Research Director.

The Facebook onion address located at https://www.facebookwkhpilnemxj7asaniu7vnjjbiltxjqhye3mhbshg7kx5tfyd.onion/ is a site that allows access to Facebook through the Tor protocol, using its .onion top-level domain.

References

  1. 1 2 Aaron, Swartz (24 October 2008). "In Defense of Anonymity". Raw Thought. Retrieved 4 February 2014.
  2. 1 2 Zetter, Kim (12 December 2008). "New Service Makes Tor Anonymized Content Available to All". Wired . Retrieved 22 February 2014.
  3. Cheng, Jacqui (15 December 2008). "tor2web brings anonymous Tor sites to the "regular" web". Ars Technica . Retrieved 22 February 2014.
  4. Filastò, Arturo. "Tor2web 2.0 is live!". Seclists.

List of active tor2web-like services

Need's new gateways

ADD THEM HERE