Tor’s Developer Leaves After Lurid Sexual Allegations

Tor is free software that channels internet traffic through a series of relays to anonymize its users. 

The Tor Project confirmed recently that one of its prominent developers, Jacob Appelbaum, stepped down in response to what it called “public allegations of sexual mistreatment.” 

In addition to his security research at the Tor Project, Appelbaum is a journalist who worked on WikiLeaks and the Edward Snowden disclosures. 

The Tor Project, which develops the Tor browser and network, had previously only acknowledged Appelbaum’s departure in a one-sentence statement, but went into further detail about his resignation after rumors of assault emerged online.

Rolling Stone called him the “public face of the Tor Project” in a 2010 profile that detailed his involvement with Tor and WikiLeaks. Before joining Tor, Appelbaum worked on security for Greenpeace and the Rainforest Action Network.

Tor Project executive director Sherri Steele said in a statement that allegations of sexual assault had followed Appelbaum for quite some time. “These types of allegations were not entirely new to everybody at Tor; they were consistent with rumors some of us had been hearing for some time. That said, the most recent allegations are much more serious and concrete than anything we had heard previously.”

Steele added that The Tor Project had heard allegations from several victims about Appelbaum’s behavior towards them. The Tor Project has hired a legal firm to investigate the statements, but Steele said she did not expect that the results of the investigation would be made public.

Steele initially announced Appelbaum’s resignation in a simple statement: “Long time digital advocate, security researcher, and developer Jacob Appelbaum stepped down from his position at The Tor Project on May 25, 2016,” she wrote.

Despite the terse announcement, the backstory of Appelbaum’s resignation quickly emerged online.

Andrea Shepard, a Tor developer, tweeted the decoded version of a message she’d originally posted on May 24, one day before Appelbaum stepped down. “It seems one rapist is one rapist too many,” she wrote. (SHA-256 references the hash used to encode the original message.)

Alison Macrina, the founder of The Library Freedom Project, also referenced the allegations on Twitter, saying she had spoken to several victims. The Library Freedom Project is an organization that educates librarians about privacy and collaborates with the Tor Project to establish Tor exit nodes in libraries. “no more open secrets, no more missing stairs. you’re not alone. you were never alone. and I’m pretty sure things are just getting started,” Macrina tweeted.

Steele said the Tor Project would work to foster a safer environment. “Going forward, we want the Tor community to be a place where all participants can feel safe and supported in their work. We are committed to doing better in the future. To that end, we will be working earnestly going forward to develop policies designed to set up best practices and to strengthen the health of the Tor community.”

TechCrunch: http://tcrn.ch/1S5d0vw

« How To Define Cyberwar
Harvard Business School Wants To Know How To Win At Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

UNS Inc.

UNS Inc.

UNS is a top services partner for multiple leaders in the global cybersecurity industry – we do business in 40 countries, including the United States, Canada, Chile, and Colombia.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.