Privacy-focused networks share a rich tradition, each building and innovating upon the other to enable users to conceal and anonymize data. Outpacing entities who develop loopholes and exploits to engage in surveillance of internal network activity requires constant patching, making the upkeep of anonymity protocols expensive.
The elite class of privacy-focused networks most notably includes the TOR browser. TOR’s primary aim is to provide privacy and security simply by hiding where TOR users are communicating from. Despite several weaknesses which have been exploited through its history, TOR has maintained a lofty reputation for providing ordinary people with privacy tools. At various times, intelligence agencies from around the world have both funded and attempted to undermine the integrity of TOR’s network.
Tor separates identification and routing using onion routing, which encrypts and then randomly bounces communications through a relay network. The sustainability of this system depends on the goodwill of roughly 7000 volunteers who are relaying …
Full story available on Benzinga.com