tor

The news is all abuzz with the compromise of the Tor (Originally The Onion Router) Network. This network has been used by a wide variety of people who are looking for a degree of anonymity. It relies on the use of different entry and exit point to prevent someone from identifying your exact IP Address or MAC address. In-between these point there are different hops that further confuse the trail. In basic terms your system is masked by the exit point which is selected randomly by the system. Now in addition the anonymity services for individual users there are also servers that host websites and even anonymous email services. Some have called this the “dark net” or “deep web” although that is not actually the case (the dark net is something else entirely). Many of these sites are legitimate sites that need to protect their readers from less than understanding authorities, but there are a larger number that are not above board at all including many sites that host child pornography.

broken-lockI love old sayings. One reason is that some are just plain funny, but another is that so many are true. In this case the old saying is “If you squeeze something too tight it will slip out between your fingers”. This is exactly what is happening with the tight internet controls that are being worked on right now.  As Google, Twitter and others are working on hiding dissenting topics and tweets that governments do not want visible in their countries people like the TOR (The Onion Router) Project are working to get around those restrictions.