TOR is short for The Onion Router. This is a unique proxy server system that allows you to establish an anonymous Internet connection, completely protected from eavesdropping. TOR browser allows you to use this network.
Instructions
Step 1
TOR is essentially a network of virtual tunnels that allows information to be transmitted in encrypted form. Most of the code is written in C, C ++ and Python. According to Ohloh data as of July 2014, TOR contains 340 thousand lines of code (developer comments are not taken into account).
Step 2
Using the TOR browser, users can maintain absolute anonymity on the Internet. The nature of the actions in this case does not matter: you can just visit the sites, but you can publish materials, send messages to other users, or use various applications. At the moment, there are working versions of the browser for all operating systems.
Step 3
This system was developed with the support of the US Navy Research Laboratory. However, in 2002, it was decided to declassify this development and hand it over to independent programmers, who created the first version of the browser. Later this program was distributed under a free license and had an open source code.
Step 4
Russia is in third place in terms of the popularity of using this program. Thus, according to statistics for July 2014, about 159,000 Russian residents connect to this network every day. Germany is in second place (205,000), and the United States is in first (322,000). It is worth noting that in January 2014 Russia was in 9th place, with an average of 91,900 daily connections.
Step 5
The possibilities for using the TOR network are really huge. Any user can access information that is blocked by standard Internet censorship. You can also create a website of any subject, without disclosing the real location, contact details and other information.
Step 6
Moreover, such anonymity has both positive and negative sides. For example, TOR is often used by social workers to communicate with victims of military conflicts, violence, refugees, and people with mental or physical disabilities. At the same time, there is a huge layer of problem areas. For example, using TOR, you can disseminate information about drugs, the manufacture of weapons and other prohibited topics.
Step 7
Many services, including government ones, use this network for their own needs. For example, law enforcement agencies can enter websites through TOR in order not to leave their IP addresses, as well as to protect employees during various special operations.