Why we need Tor now more than ever

Since Edward Snowden leaked documents demonstrating the breadth of the National Security Agency’s digital surveillance last year, the global conversation around Internet freedom has shifted from censorship to surveillance. Where once the focus was on China’s Great Firewall or Iran’s vision of a “halal Internet,” now eyes are trained on the use of FinFisher for targeted surveillance or the NSA’s global dragnet.

But censorship and surveillance go hand in hand. Just as censorship restricts individuals from accessing information and communicating freely, surveillance also chills speech, causing fear amongst a populace and hindering innovation, communications, and progress.

Initially developed by the U.S. Naval Research Laboratory and DARPA, Tor (which originally stood for “the onion router”) is free software that enables anonymity and censorship circumvention. Since 2006, the Tor Project has operated as a nonprofit organization based out of Massachusetts; it receives funding from a range of sources, including individual donors. Karen Reilly, the Tor Project’s development director, told me that since the organization enabled donations with Bitcoin—the peer-to-peer payment system that allows users to send money anonymously the organization has seen an uptick in donations, an unsurprising development given their user base.

Tor often gets a bad rap for its ability to enable criminals to operate anonymously online, but for many of its users around the world, it’s a necessity.

From Syria where tech-savvy Internet users have long taken advantage of Tor’s ability to circumvent state censorship—to countries like the United States, where people utilize the tool for a variety of reasons, Tor (when used correctly) ensures that governments, individuals, and corporations alike are unable to spy on Internet users’ activities. It serves as a digital shield, protecting the identity and communication of those who need it most, like domestic abuse victims and transgendered service members, to give but two examples of oft-overlooked Tor users.

It isn’t just individuals in repressive environments that value Tor, however. Zack Whittaker, an editor with CBS Interactive, says that for journalists, the tool is vital.

“Covering national security, law, politics, and technology, particularly in the post-Snowden era, means source secrecy is more important than ever,” Whittaker argues. “Without Tor, I couldn’t do my job.”

Tor (when used correctly) ensures that governments, individuals, and corporations alike are unable to spy on Internet users’ activities. Post-Snowden, it seems Tor’s biggest challenge might be in meeting user demand. Tor’s software relies on a volunteer network of “relays,” operated by individuals and organizations around the world. In other words, as the Electronic Frontier Foundation explained in a recent challenge to improve the network, “the more Tor relays we have running, the faster, more robust and more secure the Tor network will be.”

Apart from the aforementioned concerns about malevolent usages of Tor, an oft-expressed concern from new users is that using the software will make them more suspicious. However, the more users on the Tor network in a given locale, the more hidden each individual user is. That’s why widespread adoption is crucial in the areas where it’s needed most, and that’s why Tor needs to push forward despite its more nefarious capabilities.

The anonymity that Tor provides either works for everyone or it works for no one. It can only assist massive liberation movements like the Arab Spring or help to defend journalists and free speech from oppressive regimes even if it can also enable criminals. If anonymity is to be truly safe and secure, that means it has to be safe and secure for everyone.   

kernel

« Is Big Data the Best Preparation Against Natural Disasters?
Desmond investment bets on spooks to win cyber war »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

DataArt

DataArt

DataArt is a global technology consultancy that designs, develops and supports unique software solutions. Areas of activity include software security testing.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.