{"id":13696,"date":"2015-10-22T10:00:26","date_gmt":"2015-10-22T10:00:26","guid":{"rendered":"https:\/\/www.whizlabs.com\/?p=13696"},"modified":"2020-08-31T12:23:09","modified_gmt":"2020-08-31T12:23:09","slug":"tor-the-onion-router","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/tor-the-onion-router\/","title":{"rendered":"Tor \u2013 The Onion Router"},"content":{"rendered":"<p>Social media keeps us all firmly wrapped in its arms and life is as usual on the net oblivious to the many \u201cvirtual eyes\u201d. Customer data is another new gold and grabbing it is the necessity of the day.<\/p>\n<p>\u201cDeep web\u201d or the \u201cDark net\u201d is the place where there is no Internet surveillance. The \u201cDeep web\u201d was earlier only associated with criminal activities but that may be changing with a new set of extremely privacy conscious individuals who also seek anonymity while surfing. This is possible with browsers like Tor, Freenet, I2P and Tails. In addition, \u2018The Deep web\u2019 is not indexed by search engines and hence does not turn up in search results. We will discuss \u2018Tor \u2013 The Onion Router\u2019 in this post.<\/p>\n<h2><span lang=\"EN-US\">What is Tor and \u2018the Deep web\u2019?<\/span><\/h2>\n<p>\u2018Tor\u2019, \u2018<strong><span style=\"text-decoration: underline\">T<\/span><\/strong>he <strong><span style=\"text-decoration: underline\">O<\/span><\/strong>nion <strong><span style=\"text-decoration: underline\">R<\/span><\/strong>outer\u2019 is a set of volunteer servers that is designed to keep traffic analysis private and untraceable. It was first developed by United States Naval Research employees and further developed by DARPA (Defense Advanced Research Projects Agency) in 1997. It is free software that is available for Windows, Linux\/Unix, Mac and Android operating systems. The Tor software was originally written in the \u2018C\u2019 programming language and has 340,000 lines of source code.\u00a0(Tor (anonymity network))<\/p>\n<p>Most conversations outside the \u201cDeep web\u201d can be tracked and spied upon. But by using browsers like \u2018Tor\u2019, the location of users is concealed and conversations are private. This is the reason that \u2018Tor\u2019 is sometimes used for legal and illegal purposes.<\/p>\n<p>There is no accurate estimate of how deep the \u201cThe Deep web\u201d actually is but is expected to be 500 times the size of the surface web. According to some statistics, there are 500,000 to 1 million individuals from India browsing the deep web every day. (More Indians are logging on anonymously using browsers like Tor, Freenet, I2P and Tails )<\/p>\n<p>Once inside the \u2018Deep web\u2019, websites comes with different URLs that end with a suffix \u2018.onion\u2019.<\/p>\n<h2><span lang=\"EN-US\">How does Tor work?<\/span><\/h2>\n<p>Data that is passed through the Internet is divided and these are known as \u2018packets\u2019. An individual\u2019s digital footprint can easily be ascertained by looking at the \u2018packets\u2019. All packets have a \u2018payload\u2019 and a \u2018header\u2019. While the \u2018payloads\u2019 can be encrypted the \u2018headers\u2019 are not and these contain information about where this packet originated, where is it headed, its size and timing and so on. Various traffic analysis tools and network monitoring tools exist to sniff traffic and study user habits. Authorized and unauthorized persons can read the traffic between the sender and receiver by looking at the packet headers. \u00a0<a href=\"https:\/\/www.whizlabs.com\/wp-content\/uploads\/2015\/10\/TOR1.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-13698\" src=\"https:\/\/www.whizlabs.com\/wp-content\/uploads\/2015\/10\/TOR1.jpg\" alt=\"TOR1\" width=\"1000\" height=\"608\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>In a Tor network communication from the source to the destination follows a circuitous path to avoid tracking. Each node in the relay only knows the next node it has to reach and does not know the entire path. Further, every path in the relay is encrypted, except for the last path to the destination. Once the path has been traversed, the previous path in the relay in carefully erased.<\/p>\n<p>This in short is how \u2018Tor\u2019 works.<\/p>\n<h2><span lang=\"EN-US\">Conclusion:<\/span><\/h2>\n<p>\u2018Tor\u2019 is not the perfect solution for 100% anonymity but certain careful measures (like not providing names, credit card numbers) while browsing the web will provide greater success in achieving the same.<\/p>\n<h5><span lang=\"EN-US\">Bibliography<\/span><\/h5>\n<pre><em>More Indians are logging on anonymously using browsers like Tor, Freenet, I2P and Tails <\/em>. (n.d.). Retrieved from economictimes.com: http:\/\/economictimes.indiatimes.com\/tech\/internet\/more-indians-are-logging-on-anonymously-using-browsers-like-tor-freenet-i2p-and-tails\/articleshow\/49330271.cms\n<em>Tor (anonymity network)<\/em>. (n.d.). Retrieved from Wikipedia.com: https:\/\/en.wikipedia.org\/wiki\/Tor_(anonymity_network)<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Social media keeps us all firmly wrapped in its arms and life is as usual on the net oblivious to the many \u201cvirtual eyes\u201d. Customer data is another new gold and grabbing it is the necessity of the day. \u201cDeep web\u201d or the \u201cDark net\u201d is the place where there is no Internet surveillance. The \u201cDeep web\u201d was earlier only associated with criminal activities but that may be changing with a new set of extremely privacy conscious individuals who also seek anonymity while surfing. This is possible with browsers like Tor, Freenet, I2P and Tails. In addition, \u2018The Deep web\u2019 [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[17],"tags":[932],"class_list":["post-13696","post","type-post","status-publish","format-standard","hentry","category-news-updates","tag-information-security"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"profile_24":false,"profile_48":false,"profile_96":false,"profile_150":false,"profile_300":false,"tptn_thumbnail":false,"web-stories-poster-portrait":false,"web-stories-publisher-logo":false,"web-stories-thumbnail":false},"uagb_author_info":{"display_name":"Pavan Gumaste","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/pavan\/"},"uagb_comment_info":0,"uagb_excerpt":"Social media keeps us all firmly wrapped in its arms and life is as usual on the net oblivious to the many \u201cvirtual eyes\u201d. Customer data is another new gold and grabbing it is the necessity of the day. \u201cDeep web\u201d or the \u201cDark net\u201d is the place where there is no Internet surveillance. The&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/13696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=13696"}],"version-history":[{"count":1,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/13696\/revisions"}],"predecessor-version":[{"id":75870,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/13696\/revisions\/75870"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=13696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=13696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=13696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}