33 Facts About Tor Browser

1.

Tor Browser's intended use is to protect the personal privacy of its users, as well as their freedom and ability to communicate confidentially through IP address anonymity using Tor Browser exit nodes.

FactSnippet No. 702,856
2.

The alpha version of Tor Browser, developed by Syverson and computer scientists Roger Dingledine and Nick Mathewson and then called The Onion Routing project, was launched on 20 September 2002.

FactSnippet No. 702,857
3.

Attacks against Tor Browser are an active area of academic research that is welcomed by The Tor Browser Project itself.

FactSnippet No. 702,858
4.

Tor Browser enables its users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both licit and illicit purposes.

FactSnippet No. 702,859
5.

Tor Browser is not meant to completely solve the issue of anonymity on the web.

FactSnippet No. 702,860
6.

Tor Browser is not designed to completely erase tracking but instead to reduce the likelihood for sites to trace actions and data back to the user.

FactSnippet No. 702,861
7.

Tor Browser has been described by The Economist, in relation to Bitcoin and Silk Road, as being "a dark corner of the web".

FactSnippet No. 702,862
8.

Tor Browser aims to provide protection for ordinary people who want to follow the law.

FactSnippet No. 702,863
9.

Tor Browser aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing.

FactSnippet No. 702,864
10.

Tor Browser periodically creates virtual circuits through the Tor Browser network through which it can multiplex and onion-route that traffic to its destination.

FactSnippet No. 702,865
11.

Applications whose traffic is commonly anonymized using Tor Browser include Internet Relay Chat, instant messaging, and World Wide Web browsing.

FactSnippet No. 702,866
12.

In 2012, LASTor Browser proposed a method to predict a set of potential ASes on these two segments and then avoid choosing this path during the path selection algorithm on the client side.

FactSnippet No. 702,867
13.

In October 2019, a Tor Browser researcher revealed that since at least 2017, there were hundreds of highly suspicious entry, relay, and exit nodes, run by an unknown group, in an unprecedented scale.

FactSnippet No. 702,868
14.

On 30 July 2014, the Tor Browser Project issued the security advisory "relay early traffic confirmation attack" in which the project discovered a group of relays that tried to de-anonymize onion service users and operators.

FactSnippet No. 702,869
15.

The Tor Browser automatically starts Tor background processes and routes traffic through the Tor network.

FactSnippet No. 702,870
16.

Onion Browser is open-source, privacy-enhancing web browser for iOS, which uses Tor.

FactSnippet No. 702,871
17.

Tor Browser has been praised for providing privacy and anonymity to vulnerable Internet users such as political activists fearing surveillance and arrest, ordinary web users seeking to circumvent censorship, and people who have been threatened with violence or abuse by stalkers.

FactSnippet No. 702,872
18.

Tor Browser receives funding from NGOs including Human Rights Watch, and private sponsors including Reddit and Google.

FactSnippet No. 702,873
19.

Tor executive director Andrew Lewman said that even though it accepts funds from the U S federal government, the Tor service did not collaborate with the NSA to reveal identities of users.

FactSnippet No. 702,874
20.

Critics say that Tor is not as secure as it claims, pointing to U S law enforcement's investigations and shutdowns of Tor-using sites such as web-hosting company Freedom Hosting and online marketplace Silk Road.

FactSnippet No. 702,875
21.

In October 2013, after analyzing documents leaked by Edward Snowden, The Guardian reported that the NSA had repeatedly tried to crack Tor Browser and had failed to break its core security, although it had had some success attacking the computers of individual Tor Browser users.

FactSnippet No. 702,876
22.

When Tor Browser users are arrested, it is typically due to human error, not to the core technology being hacked or cracked.

FactSnippet No. 702,877
23.

In March 2011, The Tor Browser Project received the Free Software Foundation's 2010 Award for Projects of Social Benefit.

FactSnippet No. 702,878
24.

In June 2013, whistleblower Edward Snowden used Tor Browser to send information about PRISM to The Washington Post and The Guardian.

FactSnippet No. 702,879
25.

In October 2014, The Tor Browser Project hired the public relations firm Thomson Communications to improve its public image and to educate journalists about the technical aspects of Tor Browser.

FactSnippet No. 702,880
26.

In July 2015, the Tor Browser Project announced an alliance with the Library Freedom Project to establish exit nodes in public libraries.

FactSnippet No. 702,881
27.

The pilot program, which established a middle relay running on the excess bandwidth afforded by the Kilton Library in Lebanon, New Hampshire, making it the first library in the U S to host a Tor node, was briefly put on hold when the local city manager and deputy sheriff voiced concerns over the cost of defending search warrants for information passed through the Tor exit node.

FactSnippet No. 702,882
28.

Tor Browser was fundamental to the operation of the darkweb marketplace AlphaBay, which was taken down in an international law enforcement operation in July 2017.

FactSnippet No. 702,883
29.

Tor Browser came out strongly against the raid against its support organization, which provides legal and financial aid for the setting up and maintenance of high-speed relays and exit nodes.

FactSnippet No. 702,884
30.

Since October 2018, Chinese online communities within Tor Browser have begun to dwindle due to increased efforts to stop them by the Chinese government.

FactSnippet No. 702,885
31.

The Tor Browser Project has appealed to Russian courts over this ban.

FactSnippet No. 702,886
32.

Tor Browser responded to earlier vulnerabilities listed above by patching them and improving security.

FactSnippet No. 702,887
33.

For example, Tor warns its users that not all traffic is protected; only the traffic routed through the Tor browser is protected.

FactSnippet No. 702,888