The TOR

Shivendra Anand
System Weakness
Published in
4 min readJan 23, 2023

--

What is it?

The Tor network, also known as the Onion Router, is a system of interconnected nodes that enables anonymous communication over the internet. It was originally developed by the U.S. Navy in the mid-1990s for the purpose of protecting government communications, but it has since been made available to the public as free, open-source software.
The Tor network is a distributed system of nodes that enables anonymous communication by routing internet traffic through a series of randomly-selected relays before reaching its final destination.

What it does?

The Tor network is known for its use of multi-layer encryption to conceal the origin of internet traffic, making it difficult for any observer to determine the original source or the ultimate destination of the traffic.

User’s traffic across the TOR Network

How it works?

When a user connects to the internet through the Tor browser, the client software establishes a circuit of three relays, referred to as an "onion circuit."

The first relay in the circuit is called the entry guard, the middle relays in the circuit are the relay nodes, and the last relay is called the exit node.

The client software encrypts the traffic multiple times, wrapping it in layers like an onion, before sending it through the circuit.

Each relay in the circuit decrypts one layer of encryption and forwards the traffic to the next relay in the circuit.

The entry guard is responsible for preventing an attacker from linking a user’s IP address to their identity.

The middle relays carry the traffic through the network, and the exit node sends the traffic on to its final destination.

The exit node is the only node in the circuit that knows the final destination of the traffic, and it can also see the unencrypted traffic.

When a user requests a web page, the client software establishes a new circuit for each request, and the relays are selected randomly from the pool of available relays.

To access hidden services, which are websites and other services that can only be accessed through the Tor network, a user must use a special “.onion” domain.

It is important to note that while the Tor network provides a high degree of anonymity, it is not completely foolproof. An attacker with sufficient resources and expertise could potentially monitor multiple relays in the network and use traffic analysis techniques to de-anonymize users.

Additionally, users should be aware that the exit node in a circuit can see and potentially modify any unencrypted data that is sent through it.

Which browser to use?

The TOR browser.
It is a free and open-source web browser that is specifically designed to protect users’ privacy and anonymity while browsing the internet. It is based on the Firefox web browser and is distributed by the Tor Project, a non-profit organization that promotes online privacy and freedom.

Functionalities this browser provides:

  • Anonymous browsing: Routing internet traffic through the Tor network to protect users’ privacy and anonymity while browsing the internet.
  • Multi-Layered Encryption: Encrypting internet traffic multiple times to provide an additional layer of security.
  • Automatic Circuit Creation: Creating a new circuit for each request to prevent tracking of user’s internet activity.
  • Built-In Privacy Features: Includes features such as disabling third-party cookies, blocking scripts, and disabling Flash to protect users’ privacy and security.
  • Access to Hidden Services: Allows access to websites and other services that can only be accessed through the Tor network.
  • Enhanced Security: Includes security features such as NoScript, HTTPS Everywhere and Torbutton to enhance the security of the browsing.
  • Easy to Use: Does not require any technical knowledge to set up or use.

To sum up, Tor Browser is an effective tool for maintaining online privacy and anonymity. Users can utilize its built-in features to browse the internet anonymously, encrypt their internet traffic, and access hidden services. It is crucial to note, however, that while the Tor network provides a high level of anonymity, it is not entirely safe. Users should be aware of its restrictions and take proper precautions, such as using a VPN or only visiting websites that use HTTPS. It’s also worth noting that the exit node in a circuit can see and perhaps manipulate any unencrypted data that passes through it, so use the Tor browser with caution and only for the intended purpose.

--

--