{"id":65363,"date":"2017-02-22T14:04:04","date_gmt":"2017-02-22T12:04:04","guid":{"rendered":"https:\/\/www.mywot.com\/en\/blog\/?p=65363"},"modified":"2025-01-07T11:59:19","modified_gmt":"2025-01-07T09:59:19","slug":"tor","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/tor","title":{"rendered":"Tor: Privacy Upgrade or Mask for Criminals?"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-65364\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/02\/Tor_Blog_Image.jpg\" alt=\"tor for criminals or privacy advocates\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/02\/Tor_Blog_Image.jpg 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/02\/Tor_Blog_Image-300x178.jpg 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/02\/Tor_Blog_Image-768x456.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><strong>Down the Clickhole: Exploring the Deep Web<\/strong><\/p>\n<p><strong>Chapter 2: Tor: Privacy Upgrade or Mask for Criminals?<\/strong><\/p>\n<p>If you wish to remain anonymous online, Tor is for you. In <a href=\"https:\/\/www.mywot.com\/blog\/deep-web\">chapter 1<\/a> we briefly defined Tor and a few of its uses. In this chapter, we\u2019re taking an in-depth <em>tour<\/em> of Tor, understanding what it is and its role on the deep web.<\/p>\n<p>\u201cTor\u201d is short for \u201cThe Onion Router\u201d, which was released in September 2002. Tor is used to direct Internet traffic through a free online network consisting of over 7,000 relays to hide a user\u2019s physical location and usage though network surveillance. Tor makes it virtually impossible for anyone to see your webmail, search engine history, social media activity, or other web activity for that matter.<\/p>\n<p><strong>How does Tor work?<\/strong><\/p>\n<p>Tor operates thanks to thousands of volunteers over thousands of servers worldwide. Data is encrypted and bundled into a \u201cdata packet\u201d when it is placed on the Tor network. Data packets are any kind of data sent online, like an email or instant message. Tor then anonymizes the packet by stripping part of the packet header, which contains information that could tie the packet to the sender.<\/p>\n<p>The packet\u2019s wrapper is encrypted and the packet can move anonymously around the network. Typical internet connections cannot encrypt or strip the wrapper like Tor can. The modified data is routed through several servers along the way to its destination. Bouncing around multiple servers rather than moving directly to the destination greatly complicates any tracing attempts.<\/p>\n<p><strong>How to download Tor<\/strong><\/p>\n<p>You can download Tor on any OS, even your smartphone by visiting the <a href=\"https:\/\/www.torproject.org\/download\/download\">Tor download site<\/a> \u2013 it works on Windows, Apple, Linux, and smartphones. Switching to Tor isn\u2019t as simple as switching between Chrome and Firefox &#8211; Tor will require you to change your online habits. For instance, you will probably need to configure individual apps to send web traffic through Tor. Depending on how many apps you have that use an internet connection, this can be a tedious process, but remember, you only need to set it up once.<\/p>\n<p><strong>Should Tor be used for regular browsing?<\/strong><\/p>\n<p>Tor is widely used by privacy advocates and activists, reporters who wish to protect their sources, and a community of cybercriminals, who can operate with anonymity. Users also include \u201cnormal people\u201d who are tired of being bombarded by online ads, and other annoying junk web mail. The five most popular countries for Tor relay users are the U.S., Russia, Germany, the UAE, and France. Due to its strong encryption, Tor is recommended for people concerned about privacy. With so many security breaches of private data, Tor can serve as a safety net in your <a href=\"https:\/\/www.mywot.com\/blog\/online-threats-types\">multi-layered online security<\/a> suite. While its privacy is welcomed, many complain that it\u2019s often slow.<\/p>\n<p><strong>Alternatives to Tor<\/strong><\/p>\n<p>Tor isn\u2019t for everyone. If you determine that it\u2019s not the browser you\u2019re looking for, several alternatives exist. <a href=\"https:\/\/freenetproject.org\/\">FreeNet<\/a> is one of the top Tor alternatives. FreeNet utilizes Darknet and OpenNet technology. FreeNet does not contain a central server, which could be vulnerable to attack. Data encryption occurs <em>before<\/em> it is stored, which makes it a strong Tor alternative. Hackers and data tracking software cannot intercept stored data on FreeNet. Even FreeNet administrators can\u2019t tell what type of data is stored on their network.<\/p>\n<p>Another Tor alternative is the <a href=\"https:\/\/geti2p.net\/en\/\">Invisible Internet Project (I2P)<\/a>. I2P encrypts data in layers and uses public and private keys to encrypt network traffic. Some consider I2P an internet hidden within the internet because it creates a network layer inside UDP and TCP\/IP network sessions, making it the perfect way to store private and personal data.<\/p>\n<p><strong>What are the security risks for using Tor?<\/strong><\/p>\n<p>Like everything else on the Internet, Tor is not 100% completely safe to use. It\u2019s important to remember, many online predators and criminals have used Tor for malicious intent, and will continue doing so. Tor\u2019s anonymity protects both innocents and criminals alike. Tor\u2019s strongest feature is unfortunately exploited by malicious users to openly run their business on the black market while enjoying full anonymity. This is known as the <a href=\"https:\/\/www.mywot.com\/blog\/dark-web\">Dark Web<\/a>. You can check out a very interesting <a href=\"https:\/\/www.youtube.com\/watch?v=HJOSm9Bg7WY\">dark web documentary<\/a> by Vice Motherboard for more on this.<\/p>\n<p>Some of the criminal activities on Tor include the infamous Silk Road, which allowed users to sell drugs, child pornography and weapons. While Silk Road was taken offline in 2013, online black marketplaces still exist and are getting more and more sophisticated. Today, everything that was for sale on Silk Road is still available, along with sophisticated hacking attacks, malware-as-a-service, such as <a href=\"https:\/\/www.mywot.com\/blog\/protect-ransomware\">ransomware<\/a> and hacking-as-a-service. These markets have evolved to the level where users can leave reviews for the products and services they procured, increasing the odds that the next buyer will get what they pay for.<\/p>\n<p>The largest security risk when using Tor exists on the \u201cexit node\u201d, which is where encrypted Tor traffic enters and exits the internet. Specifically, it\u2019s the exact point where data packet leaves the Tor network between the Tor exit relay and the internet. Once traffic exits the relay, it can be exposed to monitoring. Although there is no true way to predict what exits the Tor network, the <a href=\"https:\/\/www.wired.com\/2013\/09\/freedom-hosting-fbi\/\">FBI successfully hacked Tor<\/a> in 2013 due to criminal activity and is still likely monitoring it. The FBI or anyone wishing to sniff traffic can exploit at the exit relay or exit node. All traffic not using HTTPS is even more vulnerable at the exit node because the traffic will not be encrypted after exiting the Tor network.<\/p>\n<p><strong>Why is Tor so slow?<\/strong><\/p>\n<p>Because of the nature of how data packets move through Tor in a complicated pattern, hopping from server to server before it hits the exit node, Tor will never be fast. Network latency exists with every data packet because not only is your data bouncing all around the world, some network bottlenecks also slow the traffic down. There is very little you can do about the slowness of Tor. If you want to try speeding it up, you can do some research ways to change exit nodes, however, the everyday user will not have the knowledge to do this.<\/p>\n<p>To summarize, Tor is neither \u201cgood\u201d or \u201cbad\u201d. It\u2019s simply a medium that facilitates extreme privacy online at the cost of speed. Sadly, this is high degree of privacy is exploited by cybercriminals, and enables large-scale crime to run unchecked. It\u2019s the responsibility of the everyday user to not support these activities. In the next chapter of this series, we will take a closer look at the \u201cDark Web\u201d, and the implications of browsing on it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Down the Clickhole: Exploring the Deep Web Chapter 2: Tor: Privacy Upgrade or Mask for Criminals? If you wish to remain anonymous online, Tor is for you. In chapter 1 we briefly defined Tor and a few of its uses. In this chapter, we\u2019re taking an in-depth tour of Tor, understanding what it is and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":65365,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[40],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tor: Privacy Upgrade or Mask for Criminals? | WOT<\/title>\n<meta name=\"description\" content=\"Discover Tor&#039;s dual role as a privacy tool and a haven for criminals. Learn how it works, its risks, and available alternatives in the deep web.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/tor\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tor: Privacy Upgrade or Mask for Criminals? | WOT\" \/>\n<meta property=\"og:description\" content=\"Discover Tor&#039;s dual role as a privacy tool and a haven for criminals. Learn how it works, its risks, and available alternatives in the deep web.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/tor\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-22T12:04:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T09:59:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/02\/Tor_Blog_Image_Square.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/tor#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/tor\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"Tor: Privacy Upgrade or Mask for Criminals?\",\"datePublished\":\"2017-02-22T12:04:04+00:00\",\"dateModified\":\"2025-01-07T09:59:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/tor\"},\"wordCount\":1125,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Online Privacy Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/tor#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/tor\",\"url\":\"https:\/\/www.mywot.com\/blog\/tor\",\"name\":\"Tor: Privacy Upgrade or Mask for Criminals? | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2017-02-22T12:04:04+00:00\",\"dateModified\":\"2025-01-07T09:59:19+00:00\",\"description\":\"Discover Tor's dual role as a privacy tool and a haven for criminals. Learn how it works, its risks, and available alternatives in the deep web.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/tor#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/tor\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/tor#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tor: Privacy Upgrade or Mask for Criminals?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tor: Privacy Upgrade or Mask for Criminals? | WOT","description":"Discover Tor's dual role as a privacy tool and a haven for criminals. Learn how it works, its risks, and available alternatives in the deep web.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/tor","og_locale":"en_US","og_type":"article","og_title":"Tor: Privacy Upgrade or Mask for Criminals? | WOT","og_description":"Discover Tor's dual role as a privacy tool and a haven for criminals. Learn how it works, its risks, and available alternatives in the deep web.","og_url":"https:\/\/www.mywot.com\/blog\/tor","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2017-02-22T12:04:04+00:00","article_modified_time":"2025-01-07T09:59:19+00:00","og_image":[{"width":400,"height":400,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/02\/Tor_Blog_Image_Square.jpg","type":"image\/jpeg"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/tor#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/tor"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"Tor: Privacy Upgrade or Mask for Criminals?","datePublished":"2017-02-22T12:04:04+00:00","dateModified":"2025-01-07T09:59:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/tor"},"wordCount":1125,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Online Privacy Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/tor#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/tor","url":"https:\/\/www.mywot.com\/blog\/tor","name":"Tor: Privacy Upgrade or Mask for Criminals? | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2017-02-22T12:04:04+00:00","dateModified":"2025-01-07T09:59:19+00:00","description":"Discover Tor's dual role as a privacy tool and a haven for criminals. Learn how it works, its risks, and available alternatives in the deep web.","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/tor#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/tor"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/tor#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"Tor: Privacy Upgrade or Mask for Criminals?"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65363"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=65363"}],"version-history":[{"count":6,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65363\/revisions"}],"predecessor-version":[{"id":68107,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65363\/revisions\/68107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/65365"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=65363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=65363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=65363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}