For years, the Tor Network has provided secure communications for journalists, businesses, investors, and private citizens alike.
According to Wikipedia:
“The U.S. National Security Agency (NSA) has called Tor “the king of high-secure, low-latency Internet anonymity”, and BusinessWeek magazine has described it as “perhaps the most effective means of defeating the online surveillance efforts of intelligence agencies around the world”. Other media have described Tor as “a sophisticated privacy tool”, “easy to use” and “so secure that even the world’s most sophisticated electronic spies haven’t figured out how to crack it”.
Later in the same article, Wikipedia states:
“In March 2011, The Tor Project received the Free Software Foundation’s 2010 Award for Projects of Social Benefit. The citation read, ‘Using free software, Tor has enabled roughly 36 million people around the world to experience freedom of access and expression on the Internet while keeping them in control of their privacy and anonymity. Its network has proved pivotal in dissident movements in both Iran and more recently Egypt.'”
Despite its popularity and widespread adoption, many people do not understand how Tor Networking works. An excellent article by Jill Scharr explains the details of Tor and yet has not received much publicity since it was written more than 6 years ago.
To learn how Tor works and why it is so effective, read Jill Scharr’s article in the Tom’s Guide web site at: https://www.tomsguide.com/us/what-is-tor-faq,news-17754.html.
- Blockchain Communication: The Future of Security and Privacy: Debrief
- How to Make Your Own Personal VPN in Under 30 Minutes
Categories: Online Privacy & Security
Leave a Reply