The Onion Routing Project – Open-Source Online Anonymity

If you think maintaining your privacy is a problem in the real world, and with the proliferation of CCTV you’d have a point, it’s nothing compared to online. Whether it’s Google monitoring your search history, your ISP tracking the sites you visit, or Facebook monitoring, well, nearly everything, if you do something online there’s a good chance that activity is being monitored somewhere. If you want to cover those tracks, it’s not enough to simply engage your browser’s ‘private’ mode; you won’t be leaving a record on your own computer, but third parties are still perfectly capable of keeping track of your activity.
Which is where a service called The Onion Routing Project, or TOR Project, steps in.

As the name suggests, TOR is an implementation of an onion routing system, and works by passing Internet traffic through a number of ‘layers’ before it reaches its destination. In practice, TOR calls the layers of its network relays, but the analogy is sound. Relays operate as stepping stones for traffic, with anonymity ensured by having your traffic use several steps to get to its destination.

As a peer to peer system, users connecting to the TOR network are encouraged to offer their own connection as a relay, but that is not a requirement to use TOR—it’s perfectly acceptable to simply use the network. Alternatively, you could run a bridge relay, which will forward traffic to other relays, but won’t allow outbound connections. If you do wish to allow use of your outbound traffic, you can limit the types of connection allowed such that your relay will forward to a destination (for example, only HTTPS).

Critical to the intended purpose of TOR, no single node knows both the source and destination address of any traffic it forwards; relays know only the address of the previous relay, ensuring users’ anonymity. Clients receive a hostof relays from a decentralised network, such that, to force clients to use its own relays, an attacker would have to subvert a majority of relay servers for a sufficiently long time that it is almost certain such an attack would be noticed. A determined third party could still see your traffic, if they were able to monitor both your entry and exit (either the relay or destination), by comparing the data packets at each end. And of course if the exit traffic is unencrypted it’s open to being read by anyone interested. The resources required to compromise TOR, therefore, preclude just about anyone outside of a government agency from performing such an attack.

The aforementioned exceptions aside, it is safe to assume that, when using TOR to access websites, IRC servers, or the like, the destination systems cannot identify you, as your IP address is not revealed to them. As far as the end point is concerned, it is communicating with the exit relay. Your ISP—the first connection point you make to the Internet—cannot tell the end destination of your traffic, as you instead communicate via a TOR relay node, and that communication is encrypted.

All of which is a long road to saying that you should have no fears that your activity carried out over TOR—be that chatting on IRC, or just browsing a few websites—is being viewed by prying eyes. The exceptions to that rule will only become relevant when you have much bigger problems than whether your ISP knows you like to read 4chan. It might seem paranoid to want to hide your Internet activity, especially if it is entirely innocent. But even those times that we don’t need it ourselves, we feel better knowing that the likes of Anonymous, the staff and volunteers of WikiLeaks, and many other Internet users who, for various reasons, do have good reason to hide what they’re doing online have a way to do so—we think you’ll agree.

This entry was posted in Feature, Internet and tagged , , , , , . Bookmark the permalink. Post a comment or leave a trackback: Trackback URL.


  1. Posted 17/03/2013 at 9:16 PM | Permalink

    Ahaa, its fastidious conversation concerning this piece of writing
    at this place at this weblog, I have read all that, so now me also commenting

    Look at my page; Vind ipad

  2. The Onion Router
    Posted 26/10/2014 at 1:55 PM | Permalink

    Hello, I want to subscribe for this weblog to
    take most up-to-date updates, therefore where can i
    do it please assist.

  3. Posted 25/09/2017 at 9:19 AM | Permalink

    good share, Wow is very fun to read it, from where the idea?

Post a Comment

Your email is never published nor shared. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

  • Welcome to TechRant…

    We are a group of techies from emerging students to full blown professionals who are enthusiastic about technology related subjects. Everyone has opinions and feelings about things, sometimes stronger than others. On TechRant, we will be sharing those opinions, and have a good ol' rant! We may also do non ranting type articles, like news, reviews, tutorials, tips and tricks, how-tos and even the odd interview.

  • Authors

  • Categories

  • Archives