Вы находитесь на странице: 1из 4

Tor’s Mission

The Tor Project builds and distributes free tools that allow
journalists, human rights activists, diplomats, business people,
and everyone else to use the Internet without being watched
online by governments or companies.
The Tor Project is also a global resource for technology, advocacy,
research, and education in the pursuit of freedom of speech,
privacy rights online, and censorship circumvention. The Tor
Project is proud to be a leading 501(c)(3) nonproft organization.

Learn more at
https://www.torproject.org/

© 2013–2015 The Tor Project – version 15.3.31.en3 – licensed under CC BY-NC-SA 4.0 Int.
Join Us
We need your help to What Tor Does Best
continue this global work Providing privacy online
in the ongoing pursuit of
Defeating censorship
freedom of speech,
privacy rights online, and Protecting journalists
censorship circumvention. Protecting human rights
Join us as a sponsor, a defenders
volunteer, a funder, or for
Protecting domestic violence
upcoming events led by victims
the Tor team.
Keeping global online channels
of information open for all
Working with policymakers
Partnering with academic and
research institutions
Law Enforcement & The Tor Project

How Tor Works


Who Uses Tor? Alice encrypts her web page
The vast majority of Tor users are request to Bob three times and
ordinary citizens who want to stay sends it to the frst relay.
in control of their privacy online—
or censored users who need to The frst relay removes the frst
circumvent Internet blockage. encryption layer but doesn't
Criminals who are willing to break learn that the web page
request goes to Bob.
the law already have more effective
options than using Tor.
The second relay removes
No Logs, No Backdoor another encryption layer and
forwards the web page request.
Tor users can rely on the privacy of
Tor. By design, a Tor relay operator or
The third relay removes the
someone with physical access to a last encryption layer and
Tor relay cannot reveal a Tor user’s IP forwards the web page request
address. Continual peer review of to Bob, but doesn't know that it
comes from Alice.
Tor's source code by academic and
open source communities ensures
that there are no backdoors in Tor. Bob doesn't know that the web
page request came from Alice,
unless she tells him so.
Anonymous Tip Lines
Tor provides the most secure
infrastructure for a truly anonymous
online tip line—critical in keeping
channels of communication safe for
witnesses and informants.
Learn More
Undercover Operations Tor’s ongoing commitment to
Tor is used by law enforcement education includes law
agencies and investigators to enforcement and policymakers.
monitor the web pages and services Tor’s documentation and support
of suspects anonymously. By hiding channels are open to everyone.
investigators’ identities and
locations, Tor can be a valuable tool Learn how to use the ExoneraTor
for successful online undercover service to fnd out whether an IP
operations. address was used by a Tor relay.
Learn more by reaching out to
Tor’s team of experts.
https://www.torproject.org/
The Benefts of Anonymity Online

How Tor Works


The Reality
Alice encrypts her web page
Internet Service Providers (such request to Bob three times and
as BT and Verizon), websites (such sends it to the frst relay.
as Google and Facebook), and
governments use a common form The frst relay removes the frst
of Internet surveillance known as encryption layer but doesn't
learn that the web page
IP address tracking to monitor request goes to Bob.
conversations over public
networks.
The second relay removes
another encryption layer and
News sites may promote forwards the web page request.
different articles based on your
location. The third relay removes the
last encryption layer and
Shopping sites may use price forwards the web page request
discrimination based on your to Bob, but doesn't know that it
country or institution of origin. comes from Alice.

An average person is tracked by


Bob doesn't know that the web
over a hundred companies that page request came from Alice,
sell profles to advertisers. unless she tells him so.

Your social media activity can


be revealed and used against
you by malicious individuals.

Freedom #1 in Privacy Online


The landscape of the Internet is
in a constant state of change, and Tor is free, open source
trends in law, policy, and technology, honed over 10 years
technology threaten anonymity as of research and development by
never before, undermining our Tor’s team of security
ability to speak and read freely researchers and software
online. Countries are watching developers.
each other as well as their own
Tor is one of the most effective
citizens, blocking websites,
technologies to protect your
watching traffc content, and
privacy online and ensure your
restricting important world news.
personal online security stays in
your control.
https://www.torproject.org/
Freedom & Privacy Online

How Tor Works


censorship
(Merriam-Webster, 2012) Alice encrypts her web page
Act of changing or suppressing speech request to Bob three times and
sends it to the frst relay.
or writing that is considered subversive
of the common good.
The frst relay removes the frst
encryption layer but doesn't
Online Censorship learn that the web page
request goes to Bob.
On a global playing feld, censorship
takes on a whole new meaning.
The second relay removes
Restricting access to information and another encryption layer and
monitoring outgoing content is more forwards the web page request.
common than most people realize.
The censorship researchers at Tor The third relay removes the
work to build tools that stay ahead of last encryption layer and
censorship tactics and provide open forwards the web page request
to Bob, but doesn't know that it
channels of communication for comes from Alice.
everyone online. The Tor team builds
partnerships to raise awareness and
Bob doesn't know that the web
educate people about the importance page request came from Alice,
of privacy online and freedom of unless she tells him so.
speech online.

Some censorship circumvention designs


Internet surveillance is common and easy. use only one layer to hide connections.

Parts of the network


could be monitored.

Bob’s connection could be


watched or he could be
working for the regime. Proxy could be
Alice could be eavesdropping
watched as she or be monitored.
connects to Bob.
Unfortunately, one layer (as
with a proxy) is easy to attack.
https://www.torproject.org/

Вам также может понравиться