Why we need Tor now more than ever

Since Edward Snowden leaked documents demonstrating the breadth of the National Security Agency’s digital surveillance last year, the global conversation around Internet freedom has shifted from censorship to surveillance. Where once the focus was on China’s Great Firewall or Iran’s vision of a “halal Internet,” now eyes are trained on the use of FinFisher for targeted surveillance or the NSA’s global dragnet.

But censorship and surveillance go hand in hand. Just as censorship restricts individuals from accessing information and communicating freely, surveillance also chills speech, causing fear amongst a populace and hindering innovation, communications, and progress.

Initially developed by the U.S. Naval Research Laboratory and DARPA, Tor (which originally stood for “the onion router”) is free software that enables anonymity and censorship circumvention. Since 2006, the Tor Project has operated as a nonprofit organization based out of Massachusetts; it receives funding from a range of sources, including individual donors. Karen Reilly, the Tor Project’s development director, told me that since the organization enabled donations with Bitcoin—the peer-to-peer payment system that allows users to send money anonymously the organization has seen an uptick in donations, an unsurprising development given their user base.

Tor often gets a bad rap for its ability to enable criminals to operate anonymously online, but for many of its users around the world, it’s a necessity.

From Syria where tech-savvy Internet users have long taken advantage of Tor’s ability to circumvent state censorship—to countries like the United States, where people utilize the tool for a variety of reasons, Tor (when used correctly) ensures that governments, individuals, and corporations alike are unable to spy on Internet users’ activities. It serves as a digital shield, protecting the identity and communication of those who need it most, like domestic abuse victims and transgendered service members, to give but two examples of oft-overlooked Tor users.

It isn’t just individuals in repressive environments that value Tor, however. Zack Whittaker, an editor with CBS Interactive, says that for journalists, the tool is vital.

“Covering national security, law, politics, and technology, particularly in the post-Snowden era, means source secrecy is more important than ever,” Whittaker argues. “Without Tor, I couldn’t do my job.”

Tor (when used correctly) ensures that governments, individuals, and corporations alike are unable to spy on Internet users’ activities. Post-Snowden, it seems Tor’s biggest challenge might be in meeting user demand. Tor’s software relies on a volunteer network of “relays,” operated by individuals and organizations around the world. In other words, as the Electronic Frontier Foundation explained in a recent challenge to improve the network, “the more Tor relays we have running, the faster, more robust and more secure the Tor network will be.”

Apart from the aforementioned concerns about malevolent usages of Tor, an oft-expressed concern from new users is that using the software will make them more suspicious. However, the more users on the Tor network in a given locale, the more hidden each individual user is. That’s why widespread adoption is crucial in the areas where it’s needed most, and that’s why Tor needs to push forward despite its more nefarious capabilities.

The anonymity that Tor provides either works for everyone or it works for no one. It can only assist massive liberation movements like the Arab Spring or help to defend journalists and free speech from oppressive regimes even if it can also enable criminals. If anonymity is to be truly safe and secure, that means it has to be safe and secure for everyone.   

kernel

« Is Big Data the Best Preparation Against Natural Disasters?
Desmond investment bets on spooks to win cyber war »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Kirkland & Ellis

Kirkland & Ellis

Kirkland & Ellis LLP is an international law firm with offices in the USA, Europe and Asia. Practice areas include Data Security & Privacy.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

DataViper

DataViper

Data viper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.