From SI410
Jump to: navigation, search
Tor Logo
The Onion Router, or Tor, is a web browser that uses a distributed network of relays to enhance privacy online.[1] The Tor Project is a non-profit corporation and allows volunteers to be a part of the tor network. Projects which have a major privacy concern are hosted on the tor network. Tor lets users publish websites and other services without needing to reveal the IP address of the site.[2] The use of Tor and it's development highlight ethical concerns on privacy.


Tor software is a free downloadable and open source browser for Windows, Mac, Unix/Linux, and Android.[3] The name "Onion Routing" refers to the specific way the data is encrypted in various layers. It works by preventing traffic analysis of packets being sent from the user's computer. Tor routes the packets through a route that is hard to follow for trackers, and periodically erases the online 'footprint'.[2] The packets take a route through the computers of various volunteers who have downloaded Tor and set it up as a relay. Tor uses the same circuit for connections for 10 minutes to ensure privacy and security.[2]

While Tor is able to scramble data through its routes to ensure that user's packets are anonymous, Tor does nothing to monitor attempts to identify traffic entering the site, providing a means of identification and accountability for interested parties. With that being said, while privacy is vastly increased by using Tor Browser, it is not guaranteed and users are recommended to use Tor in conjunction with a VPN to guarantee that their IP address is masked.

Information graphic on how Tor works


Tor was initially created by the US Navy for the sole purpose of protecting confidential information regarding the country that had to be communicated online in the mid-1990's. It wasn't until 2004 that it was made available to the public, but continued recieving copious amounts of funding from the US government.[4]

Uses of Tor

Tor is used to improve privacy on the Internet by individuals, journalists, companies, and the government.[2]

  • Individuals can use Tor to access content blocked by local internet providers, as well as browse the internet with privacy and security.
  • Journalists use Tor to communicate more safely with whistleblowers and dissidents.[2]
  • Companies use the service to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.[2]
  • The government has implemented the use of Tor in open source information gathering, including a branch of the U.S. Navy.[2]

Due to the private nature of Tor, it is also frequently used by criminals for such purposes as finding assassination markets, drug trafficking, password cracking discussion, and child pornography.

Ethical Concerns

Because Tor anonymizes traffic, it makes it possible for criminal activity to happen on the internet. The approach the Tor website takes on this issue is that "Criminals can already do bad things", and "Tor aims to provide protection for ordinary people who want to follow the law. Only criminals have privacy right now, and we need to fix that."[5] The platform itself is not meant for criminal activity, as it does not dictate or suggest how a user can or should use the anonymity it provides. The ethical use of Tor would be to use it to keep information safe that could be tracked otherwise. This includes the use by journalists to keep informants safe, as well as activist groups who need to stay anonymous or face arrest. The Tor site also mentions that individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.[2] The issue focuses mainly about online privacy, in this case an extreme case of it. It is difficult for the government to track criminals who use Tor for illegal activity, which could be argued to be a reason that it is ethically wrong. Meanwhile, it does serve moral purposes, and in itself is not a morally wrong object.

Dark Web and Darknets

The dark web and darknets are essentially exclusively accessed through encrypted networks such as Tor. The dealings that occur on the dark web are virtually untraceable and often illegal, and have become more prominent with the rise of cryptocurrencies. Transactions are made through anonymous Bitcoin payments. There are various dark web markets, but they are constantly being taken down by law enforcement. Through a dark net market, any user with internet access could purchase marijuana, opiates, hallucinogens, pornography, forgeries, and many other banned paraphernalia.

The Silk Road

One of the most popular illegal dark web markets that shut down was The Silk Road, accessible solely through Tor. Gaining access to the site consisted only of entering the phrase "silk road tor" into any search engine, and links with tutorials on how to access the site would quickly pop up.[6] The site was launched in February of 2011 after 3 months of development, with an easy registration process and zero cost. Estimates for the monthly sales numbers were slightly over 1.2 million USD per month, as of 2012. [7] The site was shut down by the FBI in October of 2013, but other similar sites popped up shortly after. One of them was called the Silk Road 2.0 and was said to be very similar to the Silk Road, but that was also shut down in November of 2014.[8]

AlphaBay and Hansa Market

AlphaBay and Hansa had become leading dark net markets by July 2017.[9] In July, 2017, Alphabay was shut down by American and European authorities.[10]AlphaBay had become over ten times the size of Silk Road.[10] Previous users of Alphabay looked for alternative markets, such as Hansa. Shortly after, the Dutch national police revealed they had taken control of Hansa, and had collected details on 50,000 transactions.[10]

Site Format

Once on the site, the Silk Road operates much as Amazon or eBay do. There are categories on the left column which allow the user to sort through the wide variety of options. Browsing through the different categories reveals many different options of products. For example, at the time of this edit, there are over 1,000 different options for purchasing cannabis. A system of feedback used by any respectable online marketplace is used where sellers earn feedback from buyers. A minimum rating must be maintained to continue to sell on the site. Once a purchase has been completed by a buyer using the appropriate amount of Bitcoins, the seller uses anonymous postage to send the package to whatever address the buyer chooses. Within a matter of days, buyers leave feedback on how the product was, seller interaction, etc., and the transaction is complete. Feedback is left based on a 5 point scale and anything less than 5 is considered a poor transaction by the community. The buyer receives illegal substances anonymously and the seller profits from a vastly expanded internet audience.

Government Action Against Darknets

Because the Tor Browser provides anonymous internet browsing, it has been historically difficult for agents from government drug agencies such as the Drug Enforcement Administration (DEA) to combat illegal activity on the platform.[11] Other than capturing less than 1% of the shipped contraband using drug dogs and other tactics, chasing the parties involved online is nearly impossible. The founder of Bitcoin had issued a warning that the cyber currency may not be entirely anonymous due to public logs kept of the transactions. According to Adrian Chen, a writer for the website Gawker which first brought the Silk Road into the public eye with an article in June of 2011, some users are now being caught by the DEA.[12] A cocaine seller named "MiN" was reportedly arrested in August 2012 after accepting a traceable Western Union money order instead of using Bitcoin. This could potentially lead DEA agents to the addresses of users to whom "MiN" had shipped the narcotics. The event did not seem to hurt the Silk Road's popularity, as business has continued to run steadily. Governments currently fight against new "darknets" that are created by shutting them down, just as they did with the Silk Road and countless other sites.

See Also


  2. 2.0 2.1 2.2 2.3 2.4 2.5 2.6 2.7
  3. Tor Project Homepage
  4. Sigalos, MacKenzie "The dark web and how to access it "
  5. Tor Project Abuse FAQ
  7. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
  8. Leger, Donna. "Feds shut down Silk Road 2.0, arrest San Francisco man" 15, April 2018.
  9. The Internet Archive: dark net comparison chart, June 2016.
  10. 10.0 10.1 10.2 Nathaniel Popper and Rebecca R. Ruiz, The New York Times, "2 Leading Online Black Markets Are Shut Down by Authorities"

(back to index)