Tor Network Architecture, Anonymity and Hidden Services
DOI:
https://doi.org/10.31224/3054Keywords:
Tor, Dark Web, Networks, Anonymity, Routing, Hidden ServicesAbstract
Developed by US Navy employees, Tor networks use advanced encryption techniques and routing to protect their users and serve as the basis for online anonymity. While some may view this as necessary in order to protect their freedom of speech and expression, others may see it as ethically concerning and reckless, due to the illegal activities that could take place. Furthermore, although Tor networks are stated to keep online traffic private and hidden, certain security issues exist that stand to contest this claim. As the concerns for ‘the dark web’ grow, in this essay I will deconstruct how Tor networks operate, the methods they employ to keep users anonymous and an evaluation of their use in the modern world
Downloads
Downloads
Posted
License
Copyright (c) 2023 Mohammed Hamza Javed

This work is licensed under a Creative Commons Attribution 4.0 International License.