

This was done by monitoring the data from entry points in the Tor network, which would allow an observer to where someone was going, but not who. The study observed the final destination of a random selection of Tor users to determine if they went to surface websites or more hidden areas of the internet after connecting to the Tor network. The leaders of the Tor Project often remind the public that “normal people” use Tor for everyday internet activities as well.Īs a personal example, I once used it to get around the Great Firewall of China when I wanted to get to the regular, uncensored internet. While it often gets bad press for how it can be used for illicit purposes, it should be said it was created and used by the United States government for often banal purposes. The potential value of this to criminals should be evident to you.

It does this by encrypting connection data and scrambling the route a computer takes to connect to a site, thus making it difficult, but not impossible, to find who is using a particular website. Tor: A kind of software that allows users to browse the internet in near-total anonymity.
