~ Tor and the Dark Web ~

What is Tor? Why do people use it? How does it work to protect privacy?

Thread 👇
2/ The Internet might feel like magic, but computers need to know how to find each other

They do this by sharing their IP Addresses, which are similar to mailing addresses in the physical world

An IP Address encodes the location of a machine's WIFI connection
3/ This results in some privacy concerns

A website can know the general location of its users

And people can know the general location of the website's servers

This makes it easy to shut down websites and survey a user's Internet activity
4/ In a previous thread I discussed VPNs and how they can help, but then they become a trusted third party and single point of failure https://twitter.com/dannydiekroeger/status/1287427727998332928?s=20
5/ For maximum privacy and censorship resistance, the best tool we have is called Tor

Tor stands for "The Onion Routing" project, and it's run by volunteers all around the world

These volunteers run Tor Relay Nodes, which assist in routing Internet traffic around secretly
6/ On the regular Internet, requests from a user to a website will pass through multiple machines with each intermediate machine knowing the IP Addresses of both sides
7/ But Tor relay nodes are different

Request across relay nodes are encrypted in a series of layers, like an Onion, and passed around several times before reaching their destinations
8/ The Onion-style multi-layered encryption guarantees that no nodes can know the sender or the destination

Each node can only know the previous and next steps in the chain
9/ As an analogy imagine there's a babushka doll, but each layer has a mail address on it, and requires a specific key to unlock it

And say you're a relay node for some message inside this babushka doll

You get it in the mail, unlock your layer, then send it to the next address
10/ You don't know how many more layers there are inside the doll, and you don't know how many layers there were before it

This is kind of how the Onion multi-layered encryption works for Tor traffic
11/ That's a simplified analogy and there's a bit more nuance in reality, but the babushka doll is a good way to begin thinking about it

The wikipedia page goes into a bit more detail if you're interested
https://en.wikipedia.org/wiki/Onion_routing
12/ So what are the ways that people can use Tor?

The first way is to use it as a privacy tool to browse the regular Internet

By using the Tor browser, your traffic will get routed through the Tor network before reaching the regular Internet

This conceals your IP Address
13/ The other way you can use Tor is to visit or run what's called a Hidden Service

These are websites that end in ".onion", and they hide the IP Address of the website owner

Sites like these make up what people call the "Dark Web"
14/ Plenty of illegal activity happens on the Dark Web, but it's also a really powerful tool for controversial journalists or people living under oppressive government regimes

The Tor website provides a deeper technical dive on how these sites work
https://2019.www.torproject.org/docs/onion-services
15/ However remember that nothing is perfect, and there are still complex ways for your activity to be tracked in some cases, but these are the best tools we have

Some weaknesses are outlined here:

https://en.wikipedia.org/wiki/Tor_(anonymity_network)#Weaknesses
16/ Well there you have it, those are the basics of Tor

The recommended way to use Tor is to use it along with a VPN

To start using Tor, you can download the Tor browser here https://www.torproject.org/download/ 
17/ As always, please ask questions in the comments, and if you know the answer to someone else's question please answer!

If you liked this thread, check out my other educational threads, which I always link on this mega-thread here: https://twitter.com/dannydiekroeger/status/1282000262782042117?s=20
You can follow @dannydiekroeger.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: