Tor and Bitcoin promise online stealth

Oct 02, 2013

The Silk Road website that was shut down by US authorities, who branded it a black market for drugs and other illicit wares, relied on Tor and Bitcoins to protect the anonymity of users.

Tor

The Tor network is a platform for online anonymity. The original name was The Onion Router, hence the acronym TOR, because the free software promises layers of protection.

Tor software encrypts online activities such as website visits or messages, and routes data through a worldwide network of relays that peel back only slight layers needed to pass information to subsequent points on the Internet.

Tor community members volunteer their computers to provide relay points and the resulting network makes it a challenge to trace Internet activities.

Privacy advocates tout Tor networks as a necessary option for Internet users to protect themselves from online snooping.

Bitcoins

Bitcoins are a digital currency likened to an Internet Age version of cash. The four-year old currency is increasingly used to make payments in online transactions.

Bitcoins are created or exchanged using complex software protocols that have resulted in them being referred to as "cryptocurrency." Transactions are processed on servers called Bitcoin miners.

There is an estimated $1.5 billion in bitcoins on the market and the digital currency can be transferred directly between smartphones or any other type of computers, raising concerns by regulators it will be used for criminal or terrorist activities.

Explore further: US authorities shut Silk Road website, arrest owner (Update 2)

add to favorites email to friend print save as pdf

Related Stories

Next question: can the NSA crack Tor keys?

Sep 09, 2013

(Phys.org) —"After more revelations, and expert analysis, we still aren't precisely sure what crypto the NSA can break. But everyone seems to agree that if anything, the NSA can break 1024 RSA/DH [DH refers ...

US seizes Bitcoin operator accounts

May 18, 2013

US authorities seized the accounts of a Bitcoin digital currency exchange operator, claiming it was functioning as an "unlicensed money service business," court documents showed Friday.

Recommended for you

US warns retailers on data-stealing malware

4 hours ago

US government cybersecurity watchdogs warned retailers Thursday about malware being circulated that allows hackers to get into computer networks and steal customer data.

Irish bookmaker apologizes for 2010 data breach

4 hours ago

(AP)—Irish betting company Paddy Power announced Thursday it is notifying hundreds of thousands of customers that most of their profile information was stolen in 2010, but hackers did not gain their credit card details ...

Misinformation diffusing online

7 hours ago

The spread of misinformation through online social networks is becoming an increasingly worrying problem. Researchers in India have now modeled how such fictions and diffuse through those networks. They described details ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

syhpgro
not rated yet Oct 03, 2013
Just like Tor can be used for freedom of speech. It can also be used to hide illegal activities. I guess that's the price you have to pay for a privacy tool like Tor. According to invisibler.com, echnically speaking, Tor is safe in protecting the privacy of Internet users