So you are an online activist? Or you just don’t want to be tracked when doing your things on the internet. Let’s consider one publicly available solution that most activists are already using so as to override some internet censorship. Tor: an anonymizer for online activists.
Note: This post isn’t about inviting you to do censored things on the internet. It is about an open source, though publicly available, a solution that is used by most citizen media activists around the world.
TOR is not illegal
The very nature of this post is to open readers’eye to an existing technology geared toward people who desperately look for a way to anonymize their online activity, to work around some local internet censorship that they may have. By the way, at this time of writing, and according to TOR’s FAQ “Tor is not illegal anywhere in the world, so using Tor by itself is fine.”
What is TOR?
So what is TOR: in fact, it’s a kind of “peer-to-peer” concept but used for security purposes. It actually is a distributed network and anonymous network. It is particularly helpful to people who don’t want their internet traffic to be tracked since the packets are distributed over the whole TOR network. To quote TOR’s website “The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints.”
How TOR works?
Let us first explain (roughly) how TOR network works. Before we start first you need to know how information gets in and out your computer. Let say, you want to open a website “X”. In normal case request for that would go from your computer to your ISP server and then directly (or almost directly but in fully unencrypted and traceable way) to this website.
This is why your ISP knows exactly what you do on the internet, this is any government agency will know where and when you were connected. Furthermore, by checking data on those computers you were connected so they will know exactly what you did. Also, if you (for example with the use of P2P network) will connect to a “hoax server”, these are set up by different agencies with parts of software or movies for you to download in order to trace your IP.
So, you think you are just downloading a film (in P2P your computer connects to many different machines without your control) while in reality, you download a movie and also you sand data to those you definitely don’t want to know about it.
What can you do with TOR?
So instead of rewriting a summary of what can be done with TOR service, I’d rather link you to the necessary materials, then you take whatever fits your needs.
So let’s say that you want to organize an anonymous online meeting so secure that even the participants can’t even be tracked. You may want to consider establishing a “Rendez-Vous” point within the TOR network via their hidden services.
Be careful though, as it is the case with other security packages, there are some warnings you need to be aware of. Check them here.
The good thing about joining the TOR network is that it is available for multiple platforms (Linux, Mac, Windows, …), if you want to give it a try, you may want to check the installation guides.
Using TOR …
Now, we will tell you how that changes with the use of TOR (and VPN). In this case, information/request from your computer goes to your ISP server and then from there to the first node of TOR network (TOR client downloads a list of nodes/computer from TOR directory). That information flows between those nodes (selection of those servers always happens at random and they only “know” about nearest servers to them – not the whole route).
After going through few of those computers (this is one of the reasons TOR is always slower than VPN) finally goes to the destination server with website “X”. Every few minutes and every time you send new request path between you and destination changes at random and because of that (unless you are specifically targeted and someone has lots of resources) you are practically invisible on the internet.
As we have said, because of this architecture of TOR network it is hard to get decent connection speeds. If you watch a movie for 5 minutes it can be great but then route changes and your stream becomes unwatchable.
TOR vs VPN
Before we will tell you latest news in regard to TOR anonymity let us tell you few words about VPN. As in the example above in case of VPN service. Request from your computer gets encrypted, then goes to through ISP server (but since data you send and receive are as we said encrypted ISP cannot easily see what is inside) to VPN server and from there to the destination.
This means that only your VPN provider holds all the data about you and your traffic. For the average Joe VPN seems like a much better solution. As long as you do not do something considered (internationally) illegal, like children porn, terrorism, etc. your VPN provider will never reveal your data (in many cases they do not even hold those data logs if local legislation does not require that). So, if you just want to surf the web (use p3p/torrents), stream movies that are normally unavailable for you VPN should be the product of choice.
Tor Project Awarded for the Role in Middle East Revolutions
Tor Project awarded! Tor project has just received recognition from the Free Software Foundation as it helped the protesters and revolutionists in the Middle East and North Africa. The award called Award for Projects of Social Benefit highlights the software as a project which significantly benefited the society by collaborating and accomplishing a task of social importance.
This excellent free software, as well as other online anonymity tools, has literally changed the lives of millions of people who were previously living under the fear and suppression of the dictators. Governments in countries from North African and the Middle East tried to censor online applications like Twitter and Facebook and for a while, they succeeded in doing so. But Tor project was successfully used to bypass the blocks to let the revolutions continue and take a definite shape.
Latest news involving TOR anonymity
OK, now since we are past the differences between TOR, VPN and normal connection to the internet we can tell you about the latest news involving TOR.
French scientists claim they have found a solution to trace user in the TOR network. Here is what they did. They build a miniature TOR network and then, using holes in the TOR software they have prepared a virus. The virus had infected 1/3 of TOR nodes. Remaining TOR servers were attacked using a different method in order for them to disconnect them from the network. Once they started to switch off, more and more information were send through still working nodes, most of them which were already infected with a virus. The main field of this virus activity was to break data encryption.
This allowed them to create a map of whole TOR network and method they used will aloe form much quicker identification of users using TOR servers. Here you can read TOR comment in this regard.
Since it is impossible to know exactly where the truth lies we advise you to take extra precautions.
Do not use Tor servers with BitTorrent
Disturbing news regarding the “bombardment” of Tor servers with DMCA notices was published by TorrentFreak.com last week. The news is important as may lead (at some point) to the service shut down. BitTorrent and Tor? Not the best idea.
For those that want to be protected while downloading with BitTorrent there are plenty of solutions, like VPN services and proxies. The benefit of such services is that they allow users to browse and download anonymously at full speeds. The downside is that users have to pay a monthly fee (usually between $5 and $15) for these premium services.
BitTorrent and Tor?
In order to avoid this fee, many BitTorrent users anonymize their traffic with Tor. This is the big problem. Although one BitTorrent user taking this option is unlikely to prove problematic, a few thousand can cause some serious damage. Tor servers are also being monitored and notified by copyright holders (the DMCA notices) for facilitating “infringing” transfers.
The conclusion is that those who value anti-censorship tools should not abuse Tor by running their BitTorrent traffic over it. Aside from the fact that torrent traffic slows down the network, the massive amount of DMCA notices may lead to servers being disconnected and, finally, Tor would no longer be available to the people who it was built for.
To sum up
This blog is about “online anonymity guide”, and I thought TOR actually is in line with what we’re trying to show our users here. Indeed, TOR is an excellent anonymizer for online activists. We’d love to hear from you how you’d use TOR services for anonymizing your internet activity.
Share your views in the comment section.