paper

Tor: The Second-Generation Onion Router

  • Authors:

📜 Abstract

This paper presents Tor, a circuit-based low-latency anonymous communication service. This architecture addresses limitations in the original Onion Routing design by adding perfect forward secrecy, a configurable exit policy, an end-to-end integrity check, and redesigning the directory servers. Tor works in the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, reliability, and efficiency. We close with a security analysis, performance evaluations, and a list of open problems.

✨ Summary

The paper “Tor: The Second-Generation Onion Router” introduces Tor, a system designed to enable anonymous communication over the Internet. It builds upon the initial Onion Routing design with enhancements like perfect forward secrecy and end-to-end integrity. These innovations aim to improve privacy and security without requiring special privileges or kernel modifications.

Since its publication in August 2004, Tor has had a significant impact on the field of network anonymity and privacy. The system is widely used for anonymous browsing and is a core technology for preserving user privacy online. Academic and industry references demonstrate its influence:

  1. Shabazz Ali, et al., “A survey on emerging online platform security: Privacy classified feature space, deep learning models and intelligent techniques,” Journal of Network and Computer Applications, 2021. Link
  2. Philipp Winter, et al., “Spoiled Onions: Exposing Malicious Tor Exit Relays,” UNSW Computing, 2014. Link
  3. Aaron Johnson, et al., “Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries,” ACM 2013. Link

The wide adoption of Tor for secure, anonymous browsing underscores its importance and validates the speed/efficiency trade-offs as initially presented in the paper. Despite some challenges and vulnerabilities, Tor remains a primary architecture for network privacy and has influenced the development of various privacy-preserving communication protocols.