Preprint / Version 1

Tor Network Architecture, Anonymity and Hidden Services

##article.authors##

  • Mohammed Hamza Javed University of Bradford

DOI:

https://doi.org/10.31224/3054

Keywords:

Tor, Dark Web, Networks, Anonymity, Routing, Hidden Services

Abstract

Developed by US Navy employees, Tor networks use advanced encryption techniques and routing to protect their users and serve as the basis for online anonymity. While some may view this as necessary in order to protect their freedom of speech and expression, others may see it as ethically concerning and reckless, due to the illegal activities that could take place. Furthermore, although Tor networks are stated to keep online traffic private and hidden, certain security issues exist that stand to contest this claim. As the concerns for ‘the dark web’ grow, in this essay I will deconstruct how Tor networks operate, the methods they employ to keep users anonymous and an evaluation of their use in the modern world

Downloads

Download data is not yet available.

Downloads

Posted

2023-06-19