
Proponents say Tor protects personal freedom and privacy. Those using Tor software encrypt their locations and bounce their messages across the network so that they’re able to conceal the originating Internet Protocol or IP address.

Tor encrypts messages and builds a volunteer network of servers around the globe to bounce that encrypted traffic in a way that evades detection.

It’s called an onion router because trying to get to the original source is like trying to peel back the layers of an onion-it’s nearly impossible. Operated by the Tor Project, it is an anonymizing tool used worldwide by journalists, human rights activists, hackers, law enforcements, and others. Tor is a free software program, and the name comes from an acronym that stands for The Onion Router. Learn more about the responsibilities of the data collectors. And so, connectivity comes with the background assumption that anonymity will be allowed.Īnonymity on the Internet stems not just from the architecture of the communications protocols, it also reflects the quasi-libertarian streak at the core of early Internet society. Network communication protocols do not, at their core, require identification. (Image: /Shutterstock) Anonymity on the InternetĪttribution on the Internet is one of the network’s more alluring, and elusive, technical aspects. Internet connectivity comes with the background assumption that anonymity will be allowed.

Tor and Bitcoin are two anonymizing tools that make it technically hard, though not impossible, to identify those on the network who wish to remain anonymous. By Paul Rosenzweig, The George Washington University Law School For some of the original designers of the Internet, anonymity was a way of giving individuals greater power to resist or avoid the government.
