TOR—The Onion Router

Publications

TOR—The Onion Router

TOR—The Onion Router

Year : 2022

Publisher : Springer Verlag

Source Title : Studies in Computational Intelligence

Document Type :

Abstract

The Internet we used to know is drastically evolving with many heavy and on-demand technologies that can cripple traditional Internet services such as reading a blog, watching multimedia, and surfing different web pages. With recent advancements, such technologies are constantly and steadily modified to an extent where privacy and anonymity are questionable. Whenever we surf online, the request and response to and from the server leave a significant quantity of supplementary information that can reveal our real identity, which we intend to hide. The information which is disclosed or tracked can be beneficial in the advertisement, and tracking metrics can be used to customize the web experience for users by showing related ads. To restrict the mass surveillance and constant tracking by corporations and government, users are now using anonymous services to host and surf the Internet: The Onion Router (TOR), proxies, and virtual private networks (VPNs). Internet services are so much entered into our lives that it is not possible to complete our day-to-day tasks without using them. However, this need has certain constraints such as being tracked, losing privacy, data theft, and identity theft. TOR is an anonymous and encrypted network, a free and open-source service used for anonymous communication, developed by US Naval Research Laboratory with its core principle, namely “Onion Routing”. Eventually, TOR benefits the user into the Deep Web or DarkNet, which involves journalists, whistleblowers, and political protestors. Hidden services that constitute the TOR network have a plethora of information such as information on Intranet systems, confidential government documents, individual personal accounts, stolen credit cards, and even drug trafficking. Using the browser bundle of TOR, an extension of Firefox, it is possible to ingress into the TOR network. This chapter thoroughly explains the TOR network, its components, and how it can help protect our privacy and give promising anonymity. Furthermore, we will analyze the loopholes of the TOR network and how we can avoid them while dealing with our privacy and anonymity.