Aerial city street grid illustrating OpenStreetMap volunteer mapping data

OpenStreetMap: How Volunteers Beat Big Tech at Mapping

Elias David

Cybersecurity researcher and digital privacy advocate. Spent a decade navigating the unindexed corners of the internet with a background in network infrastructure and a passion for digital rights.

Published: March 13, 2026  |  12 min read  |  Last updated: March 13, 2026

Total Invisibility: The Truth About the Tor Network

7 Wonders of Cyberspace — Entry #3

Every click you make online leaves a trace. Your ISP logs it. Ad networks record it. Government surveillance programs catalog it. The Tor network  formally known as The Onion Router  was built to make that trail invisible. What started as a classified U.S. Naval Research project in the mid-1990s has evolved into the world's most widely used anonymous communication network, with nearly 2 million daily users routing their traffic through a labyrinth of volunteer-run servers to vanish from the digital record. But Tor carries a reputation as sinister as it is misunderstood. Is it a lifeline for dissidents, journalists, and whistleblowers  or a criminal underground? The answer, like the network itself, has layers.

⚡ Quick Answer

The Tor network anonymizes internet traffic by encrypting data in multiple layers and routing it through three volunteer-run relays worldwide. No single relay sees both the sender and destination simultaneously. It is legal in most countries and used primarily for privacy not crime. Born in a Navy Lab: The Surprising Origins of Tor

Here is a fact that scrambles most people's assumptions: the most powerful privacy tool on the internet was invented by the United States government to protect its own intelligence operations.

In 1995, three researchers at the U.S. Naval Research Laboratory  mathematician Paul Syverson and computer scientists Michael Reed and David Goldschlag  confronted a fundamental problem. Intelligence agents communicating online were leaving fingerprints. Even encrypted traffic could be traced back to its source through traffic analysis: observe who's connecting to whom, at what time, and how much data flows, and you can map a spy network without reading a single byte.

Their solution was to route communications through a chain of intermediary computers, each knowing only the identity of its neighbors  never the full path. They called this technique onion routing, because data would be wrapped in concentric encryption layers like the skin of an onion. The Tor Project's own historical account confirms that the first prototypes were deployed in the late 1990s, initially on Sun Solaris machines.

The project became publicly available in 2002 when MIT graduates Roger Dingledine and Nick Mathewson joined Syverson to develop what they formally named Tor The Onion Routing. In 2004, the Naval Research Laboratory released the code under a free license. In 2006, Dingledine, Mathewson, and five others formally incorporated The Tor Project as a 501(c)(3) nonprofit based in Massachusetts.

📊 Key Stat: As of its inception, 80% of The Tor Project's early $2M annual budget came from the U.S. government, including the State Department and National Science Foundation — a paradox that underscores how broad the legitimate demand for anonymous communication really is.

The project's early funders made for unlikely bedfellows: the U.S. State Department, the Electronic Frontier Foundation, Human Rights Watch, Google, and the University of Cambridge all contributed. As Dingledine himself explained at an early privacy conference: the title of his talk was "What do the EFF and the Department of Defense have in common?"  and the answer was that both were funding Tor. That coalition, he argued, was the point. An anonymity network only protects individuals when its user base is diverse enough that no one can guess why any particular person is using it.

The Tor network runs on over 8,000 volunteer-operated relay servers worldwide — none of which can see the full path of your traffic. | Photo by raindog308 on lowendbox

How Onion Routing Actually Works

The metaphor is effective precisely because it's accurate. When you send a message through Tor, that message is wrapped in three independent layers of encryption — one for each relay node your data will pass through. Think of it like sealing a letter inside three envelopes, each addressed only to the next post office on the chain. Nobody at any single post office can see both where the letter originated and where it's ultimately going.

The Three-Node Circuit

Every Tor connection travels through exactly three relay nodes, each serving a distinct role:

  1. Guard Node (Entry Relay): The first stop. This relay knows your real IP address  but it cannot see your destination. It strips the outermost layer of encryption and passes the data forward, knowing only the identity of the next node.
  2. Middle Node: The anonymizing layer. This relay knows neither where the data came from originally, nor where it is ultimately heading. It simply peels another encryption layer and hands off to the exit node.
  3. Exit Node: The last relay. This node decrypts the final layer and delivers your request to the destination server. The website sees the exit node's IP address  not yours. However, the exit node itself can see unencrypted traffic if you are not using HTTPS, which is a critical limitation discussed below.

The Tor client on your device handles all of this automatically. Before your data leaves your machine, it has already been encrypted with the public keys of all three relays in sequence. As NYU's ITP Networks Lab explains, only your device holds all three decryption keys simultaneously  individual relay operators never do. The result is that no single point in the network can observe both your identity and your activity at the same time.

💡 Pro Tip: Always use HTTPS sites when browsing through Tor. The exit node can see unencrypted data. With HTTPS, even the exit node only sees an encrypted payload  it knows you visited a site, but not what you did there. The Tor Browser enforces HTTPS-Only mode by default since version 11.

Onion Services: The Hidden Web Within Tor

Standard Tor usage routes traffic to regular websites Google, the BBC, Reddit  through the three-node circuit. But Tor also supports a second model: onion services (formerly called hidden services). These are servers that exist exclusively within the Tor network, accessible only via special .onion addresses. Their IP addresses are never exposed, even to the Tor network itself.

When an onion service is set up, it registers its public cryptographic key with a set of "introduction points" inside the network. A client wanting to connect proposes a "rendezvous point"  a relay both parties agree to meet at  and the entire exchange happens without either the client or server ever revealing their true location to the other. This is how The New York Times, The Washington Post, and The Guardian operate their SecureDrop whistleblower submission systems and why they work.

"How does Tor work?" by Computerphile on YouTube. Used for informational purposes.

Who Really Uses Tor in 2026?

The gap between Tor's reputation and its actual user base is cavernous. Popular imagination places Tor at the center of drug markets and hacker forums. The data tells a different story.

📊 Key Stat: As of July 2025, approximately 2 million people use Tor daily, routing traffic through around 8,000 active volunteer-run relays. The United States accounts for roughly 18% of direct connections, with Germany and Finland close behind.

Roger Dingledine, the co-founder of the Tor Project, has addressed this misconception head-on at security conferences. At DEF CON, he stated plainly that only about 3% of Tor users connect to hidden services at all  and of those, a significant portion access entirely legitimate platforms. The most visited destination on the Tor network for years was not a drug market. It was Facebook, accessed by over a million people monthly in countries like Iran and China where the social network is blocked.

The real Tor user profile in 2026 looks something like this:

  • Journalists and sources: Organizations including The New York Times, The Guardian, and Der Spiegel operate SecureDrop portals via .onion addresses to protect whistleblowers.
  • Activists and dissidents: Tor usage spiked in Iran following the 2022 and 2026 protests. Citizens in Russia, China, and Belarus use it to access censored news and organize.
  • Cybersecurity professionals: Researchers use Tor to conduct threat intelligence work without alerting targets.
  • Privacy-conscious everyday users: People who simply do not want their ISP, employer, or ad networks tracking their browsing. No illegal intent required.
  • Law enforcement: Intelligence agencies use Tor to surveil targets without revealing government IP addresses  the same anonymity tool used by those they pursue.

In my experience conducting threat intelligence research, Tor is less a gateway to criminal activity and more a structured inconvenience one that the overwhelming majority of its users accept in exchange for genuine privacy. I have watched colleagues abandon VPNs after discovering that many log traffic regardless of their policies. With Tor, the distributed trust model means no single operator can build a complete picture. When I have traced activity through the network for academic purposes, the circuit-churning, the latency, and the encryption overhead all serve as a constant reminder that this system was engineered with paranoia as a design goal  and that, for the people who need it most, is exactly the point.

The Dark Web: What It Is and What It Isn't

Terminology matters here. Three terms get conflated constantly — and each one means something distinct.

Term What It Actually Means Requires Tor?
Surface Web Everything indexed by search engines — Google, Wikipedia, news sites No
Deep Web Everything behind login walls — your bank, email, Netflix library. Huge and almost entirely benign. No
Dark Web Sites accessible only via specialized networks like Tor, using .onion addresses. A small fraction of Tor traffic. Yes (for .onion sites)

The Tor network hosts over 65,000 unique .onion addresses, according to Tor Metrics data cited by SQ Magazine. Of these, research suggests roughly 55% host legal content. That still leaves a meaningful percentage  drug markets, stolen credential exchanges, extremist forums  that give Tor its dark reputation. The illegal activity is real. The claim that it defines the network is not.

What often goes unreported is how effectively law enforcement has penetrated dark web markets. Operation Onymous in 2014, the takedown of AlphaBay and Hansa in 2017, and numerous subsequent operations demonstrate that Tor does not guarantee impunity  particularly when users make operational security mistakes on their end. Tor protects your IP address. It cannot protect you from logging into your personal email from a Tor session, or from getting caught at a physical mailbox.

"Anonymity isn't encryption. Using encryption is good, but someone watching your traffic can learn who you're talking to, when you're talking to them, how much — and that's all of the interesting details."

Anonymous online activity is a need for millions of people — journalists, activists, and everyday privacy-conscious users worldwide. | Photo on nothingtohide

Where Tor Falls Short: Real Limitations and Risks

Tor is powerful. It is not invincible. Understanding its failure modes is as important as understanding its design especially if you are relying on it for genuine protection.

Traffic Correlation Attacks

Tor's most serious theoretical weakness is the global passive adversary an entity that can monitor both the entry and exit of the Tor circuit simultaneously. By correlating the timing, size, and frequency of packets entering and leaving the network, such an adversary can statistically link a user to their destination even without breaking the encryption. This is acknowledged by the Tor Project itself. NSA documents leaked by Edward Snowden confirmed that GCHQ described Tor as "the king of high security low latency internet anonymity"  but also confirmed active research into correlation-based deanonymization.

Exit Node Risks

The exit node decrypts the final encryption layer to deliver traffic to its destination. Anyone running a malicious exit node can read unencrypted traffic. Research has consistently found rogue exit nodes operated by intelligence agencies and opportunistic attackers. Academic work cited by Wikipedia notes that Swedish researcher Dan Egerstad once collected passwords from over 100 embassy email accounts using a compromised exit node.

Browser Fingerprinting and Human Error

Tor protects your IP. It cannot protect you from logging into an account linked to your real identity, enabling browser plugins, or using full-screen mode (which reveals your screen resolution and contributes to fingerprinting). The Tor Browser's strict defaults exist for these reasons changing them undermines the entire architecture.

⚠️ Important: Never log into personal accounts  Google, social media, email  while using Tor for anonymity. The moment you authenticate, the site knows who you are, regardless of what IP address you are using. Tor protects metadata, not identity context you volunteer.

Tor vs. VPN: An Honest Comparison

Both tools obscure your IP address from destination websites. Beyond that, their architectures differ fundamentally  and the right choice depends entirely on your threat model.

Feature Tor Network VPN
Operator trust required? No — distributed across 8,000+ volunteers Yes — single company holds all logs
Speed Slow (3 hops + encryption overhead) Fast (single server hop)
Cost Free Paid (typically $3–$15/month)
Anonymity from ISP? Yes — ISP sees only Tor entry node Yes — ISP sees VPN server IP
Access to .onion sites Yes No (unless Onion-over-VPN feature)
Protection from global surveillance Strong (but not absolute) Moderate (provider can be compelled)

The key distinction: a VPN concentrates trust in one entity. Tor distributes it across thousands of volunteers you will never identify. For high-stakes anonymity  journalists communicating with sources under authoritarian governments, for example Tor's architecture provides protections a VPN structurally cannot match. For everyday users who want speed and simply want their ISP to stop logging their browsing, a reputable no-log VPN is often the more practical choice.

Frequently Asked Questions

What is the Tor network used for?

Tor is used for anonymous internet browsing, bypassing government censorship, whistleblowing, and secure journalism. Most users are privacy-conscious individuals, activists, and journalists  not criminals. Only an estimated 3% of users access hidden services, and of those, many are entirely legal platforms.

Is using Tor illegal?

In most countries, using Tor is completely legal. It is an open-source tool endorsed by the Electronic Frontier Foundation and used by governments, NGOs, and journalists. It is blocked or restricted in authoritarian countries like China and Russia. Using Tor to commit crimes is illegal  but the tool itself is not.

Can Tor be traced by police?

Tor significantly complicates tracking, but it is not foolproof. Law enforcement has successfully deanonymized Tor users through traffic correlation analysis, malware exploits, and  most commonly  human operational security mistakes. Tor does not protect users who log into personal accounts or reveal identifying information while browsing.

Is Tor safer than a VPN?

For high-stakes anonymity, Tor is generally stronger because no single operator holds your complete traffic record. VPNs concentrate trust in one company, which can be compelled to produce logs. However, VPNs are faster, easier to use, and sufficient for most everyday privacy needs.

What is a .onion site?

A .onion site is a web address that only works through the Tor browser. These sites hide their server location using cryptographic identifiers rather than IP addresses. They include both legitimate services  whistleblowing platforms, private communication tools, censorship-resistant news outlets  and illegal marketplaces.

Does Tor hide you from your ISP?

Yes  your ISP can see that you are connecting to the Tor network, but cannot see the destination of your traffic or its content. This is a key protection. However, if you want to hide the fact that you are using Tor at all, Tor bridges and obfuscation tools like obfs4 can mask even this connection pattern.

The Bigger Picture

Tor is not a villain's tool. It is infrastructure like encrypted email or HTTPS  that is neutral by design and valuable precisely because it works for everyone equally. The Iranian dissident, the investigative journalist, the data scientist who doesn't want Google profiling her research, and yes, the criminal on a dark web market all share the same network. That is not a bug. As Dingledine has argued for decades, a network used only by criminals would immediately identify all its users as criminals.

What Tor represents  technically and philosophically is a refusal to accept that surveillance is the default state of the internet. Nearly 30 years after three Navy researchers asked a simple question about communication privacy, that refusal still powers 2 million anonymous connections every day. The onion keeps growing.

📚 Sources & References

  1. The History of Tor — The Tor Project (Official)
  2. Tor (network) — Wikipedia
  3. Onion Routing — Wikipedia
  4. Tor Statistics 2026 — SQ Magazine
  5. Tor Statistics — ElectroIQ, 2025
  6. Demystifying the Dark Web — NYU ITP Networks Lab
  7. Roger Dingledine at CyberSec&AI Connected 2020 — Gen Digital Newsroom
  8. Interview with Roger Dingledine — CloudFest 2025
  9. SecureDrop — Freedom of the Press Foundation
  10. What is Onion Routing? — NordVPN Blog
返回博客

发表评论

请注意,评论必须在发布之前获得批准。