It’s Summer Fundraising Time!

Thank you to all our generous donors who have already contributed to our cause; your support makes a tremendous impact. If you haven’t yet, please consider making a donation today to help us continue our vital work.

$3,320 of $60,000 raised

Tor and the So-Called Dark Web

by | Apr 24, 2019

The word Tor comes from the acronym T-O-R which stands for The Onion Router. What the Onion Router–or Tor–does is it routes your internet traffic through multiple Tor nodes on its way to your destination. So, on the regular internet, what we call the clear web, if you go to a website address the browser sends a request directly to the server that hosts the website, and that server returns the page directly to you. What you end up with is that your ISP and the recipient both know your IP address and can potentially figure out your identity. With the Tor browser, when you go to a web address, your request gets routed through other Tor servers so that the destination server does not know your IP address or physically where your request originated.

Tor also allows people to host websites directly on the Tor network, and these sites end in .onion rather than .com or .org or the other ones with which most people are familiar. When you access an onion site, you have the added benefit of end-to-end encryption. Tor uses public key encryption which means that each node has both a public key and private key. Anything encrypted with one’s public key can ONLY be decrypted using their private key. Conversely, anything encrypted using their private key can ONLY be decrypted using their public key. So, when you go to a .onion site, the browser receives the public keys of each node between you and the end server that you are accessing. The request is then encrypted one after the other using each node’s public key, and then the request is sent off. Each server receives the request and uses their private key to decrypt the package and send it to the next node in the chain. As the request goes through each node the layers of encryption come off, much like removing the layers of an onion. The end server then receives the final request and decrypts it. Using this layered encryption ensures that each node along the way knows nothing about what they are sending. They only have an encrypted blob, and they only know whom they are sending it to next. So, they just decrypt their portion and pass it on.

Tor is not perfect. The Onion Router isn’t perfect, but it does something that is not possible on the clear web. With the clear web, all of our web traffic is out in the open, both our IP address and also the websites that we are visiting. The government collects this data en masse. With Tor, this kind of mass surveillance is impossible. If the government invests enough time and energy, they might be able to figure out who you are as you browse in Tor, but it would have to be a targeted investigation, and if they are individually targeting you, you probably already have more significant problems than the government knowing if you visit a particular onion site.

People often call privacy-minded networks like Tor the “dark web” as if it is something scary. However, what is scarier to me is an open network where everything you do can be watched and examined. Privacy isn’t scary; it’s just part of life. When you have a private conversation with somebody, do you call it a scary, dark conversation? No, it’s just a conversation! If you pay a neighbor kid with cash (which is relatively untraceable) for shoveling your walk, is it a scary dark transaction? No! Of course not!

We have been programmed from decades on the clear web to think that anything private and untraceable on the internet must be bad. However, rather than ask what might be theoretically bad let’s focus on what is actually bad. There is something far more scary and bad than Tor, and it is the government. The government are the ones stealing thousands of dollars from you each year. The government are the ones who make the purchasing of valuable goods and services expensive and complicated. The government are the ones making demands every day on your life, and if you refuse those demands, they will smash into your home, and either kill you or else kidnap you at gunpoint and lock you in a cage.

Let’s get our priorities straight and let’s fix our perspective. Freedom isn’t what is scary. What is scary are those who violently take our freedom away. Privacy is essential to freedom, which means that privacy-minded networks like Tor are essential to our freedom online.


Originally posted at: https://technoagorist.com/2

Techno-Agorist on YouTube: https://www.youtube.com/channel/UCjWlrSuf4b4eApnFX9o82BA

Techno-Agorist on iTunes: https://podcasts.apple.com/us/podcast/techno-agorist/id1458773157

Techno-Agorist is a production of the MLGA Network. Find more great content at: https://mlganetwork.com

Ryan Burgett

Ryan Burgett

Husband, father, software developer, Mennonite pastor, and host of TechnoAgorist.

View all posts

Our Books

libertarian inst books

Related Articles

Related

Assassin Murders Bystander

Assassin Murders Bystander

  Twenty Year old Thomas Mathew Crooks murdered a bystander and injured others in an attempted assassination of former President Donald Trump. Trump suffered, a bullet injuring his ear. The killer was shot dead by a secret service counter sniper. The crowd...

read more

Kyle Anzalone on Judge Nap: The Hannibal Directive

Check out Kyle’s latest appearance on Judge Napolitano’s show, ‘Judging Freedom,’ where they discuss recent reporting by Haaretz suggesting Israel's military repeatedly invoked the infamous 'Hannibal Directive' during Hamas' October 7 attack. The Hannibal policy calls...

read more

Pin It on Pinterest

Share This