The Onion Routing Project (now known as Tor) represents freedom of information flow, using Internet space that cannot be completely monitored by global government regulations and other regulatory authorities and organizations. It uses a strong encrypted technology to surf the bright surface and dark depth of the internet with anonymity. Utilizing strong nodes and relay encryption, it also allows covert channels to experience the dark side of the Internet. It’s easy to see how it has also become a haven for hackers, criminals and abusers.
Tor easily bypasses most available access layer security solutions such as advanced next generation firewalls and other accompanied technologies. It uses dynamic proxies and constantly changing IPs in the internet over common ports, mostly 22 and 443. Every node on Tor networks masks the identity of the origin by changing IPs at each node and adopting advanced encryption metamorphism and mutations to preserve users’ anonymity, so it is virtually impossible to trace down the originator. Check out a live feed of Tor.
Since Tor provides sophisticated encryption and surf anonymity, it can be leveraged as a secure channel between end users. From emails to bank transactions, or shopping to sharing information, portals can be surfed to perform online activities. However, users should be cautious as Tor is outlawed in the eyes of the government and Internet regulators. Once you hack in to Tor, you are essentially on your own because of the anonymity and there is no regulation. It is understandable why it is often compared to the Wild West.
The bright side of Tor is that it uses portals of information indexes bigger than general indexes such as Google and Yahoo. It has been used for scientific research, valuable information indexing, authentic information sharing and freedom of information and its availability.
No censorship means freedom of information flow and transactions. Commercially, businesses set up private VPN, encryption and authentication of information while riding the open Internet. However, for example, Tor can be leveraged as a free encrypted and secure medium at the application level blending with a businesses’ Internet policies, authenticating and authorizing information. It means VPNs can be established between businesses at browser level over Tor networks that can save business expenses on sophisticated Internet VPN technology investment and maintenance.
Initially, Tor was funded by the U.S. Department of Defense and is still being used by them. The scientific community and researchers are also adopting Tor to share experiences and brainstorm ideas to integrate findings. In fact, openness of scientific research at this level opens doors for far-removed communities and scientific societies.
Since there is no censorship, regulators cannot completely to stop Tor. It is a fertile space for hackers, criminals, black traders and abusers. Child pornography sharing, selling of drugs and weapons, extortions, killings, live criminal feeds, gambling, even prostitution and criminal auctions are performed in Tor on a regular basis. It’s a wild territory.
In Tor, most business transactions run on Bitcoin, so it is hard to trace down dark buyers and sellers. The Silk Road is one of the metamorphic business portals on Tor networks.
Tor is evolving incrementally in the presence of free relay nodes and volunteer networks joining the Tor community. This will increase the capacity of the Tor network’s bandwidth. The roles of the individual, business and government are yet to be determined. Each needs to weigh the pros and cons of using Tor to decide their place in this new frontier.