Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

What Is Tor – How Does Tor Work – How to Use Tor

For years, the Tor Network has provided secure communications for journalists, businesses, investors, and private citizens alike.

According to Wikipedia:

“The U.S. National Security Agency (NSA) has called Tor “the king of high-secure, low-latency Internet anonymity”, and BusinessWeek magazine has described it as “perhaps the most effective means of defeating the online surveillance efforts of intelligence agencies around the world”. Other media have described Tor as “a sophisticated privacy tool”, “easy to use” and “so secure that even the world’s most sophisticated electronic spies haven’t figured out how to crack it”.

Later in the same article, Wikipedia states:

“In March 2011, The Tor Project received the Free Software Foundation’s 2010 Award for Projects of Social Benefit. The citation read, ‘Using free software, Tor has enabled roughly 36 million people around the world to experience freedom of access and expression on the Internet while keeping them in control of their privacy and anonymity. Its network has proved pivotal in dissident movements in both Iran and more recently Egypt.'”

Despite its popularity and widespread adoption, many people do not understand how Tor Networking works. An excellent article by Jill Scharr explains the details of Tor and yet has not received much publicity since it was written more than 6 years ago.

To learn how Tor works and why it is so effective, read Jill Scharr’s article in the Tom’s Guide web site at:,news-17754.html.

Categories: Online Privacy & Security

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.