Jump to content

Tor2web

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 195.123.209.79 (talk) at 15:09, 3 April 2016 (Operation and security: added more tor2web mirrors). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Tor2web
Original author(s)Aaron Swartz, Virgil Griffith
Developer(s)Hermes Center for Transparency and Digital Human Rights
Initial release24 October 2008 (2008-10-24)[1]
Stable release
3.1.20 / 29 July 2014; 10 years ago (2014-07-29)
Written inPython
Operating systemLinux, Tails OS
LicenseAffero General Public License
Websiteonion.to

Tor2web is a software project to allow Tor hidden services to be accessed from a standard browser without being connected to the Tor network. It was created by Aaron Swartz and Virgil Griffith.[2]

History

Tor is a network which enables people to use the Internet anonymously (though with known weaknesses) and to publish content on "hidden services," which exist only within the Tor network for security reasons and thus are typically only accessible to the relatively small number of people using a Tor-connected web browser. Aaron Swartz and Virgil Griffith developed Tor2web in 2008 as a way to support whistleblowing and other forms of anonymous publishing through Tor, allowing for materials to remain anonymous while making them accessible to a broader audience.[1][3] In an interview with Wired Swartz explained that Tor is great for anonymous publishing, but because its focus is not user-friendliness and thus not many people would install it, he wanted to "produce this hybrid where people could publish stuff using Tor and make it so that anyone on the internet could view it."[2]

The software developed by Swartz and Griffith is today considered version 1.0. Since then, it has been maintained and developed by people involved with the Hermes Center for Transparency and Digital Human Rights and its GlobaLeaks Project, with financial support from the Open Technology Fund. Version 2.0 was released in August 2011 and version 3.0 is in beta as of October 12.[4][5]

Operation and security

Rather than typical top-level domains like .com, .org, or .net, hidden service URLs end with .onion, and are only accessible when connected to Tor. Tor2web acts as a specialized proxy or middleman between hidden services and users making them visible to people who are not connected to Tor. To do so, a user takes the URL of a hidden service and replaces .onion with .tor2web.org or .torlink.co or .onion.to or .onion.ink or .onion.cab or .onion.nu or .onion.link or .onion.it.

Like Tor, Tor2web operates using servers run voluntarily by an open community of individuals and organizations.

Tor2web preserves the anonymity of content publishers but is not itself an anonymity tool and does not offer any protection to users beyond relaying data using HTTP Secure (HTTPS). Since version 2.0, a privacy and security warning is added to the header of each web page it fetches, encouraging readers to use the Tor Browser Bundle to obtain anonymity.

See also

References

  1. ^ a b Aaron, Swartz (24 October 2008). "In Defense of Anonymity". Raw Thought. Retrieved 4 February 2014.
  2. ^ a b Zetter, Kim (12 December 2008). "New Service Makes Tor Anonymized Content Available to All". wired.com. Retrieved 22 February 2014.
  3. ^ Cheng, Jacqui (15 December 2008). "tor2web brings anonymous Tor sites to the "regular" web". arstechnica.com. Retrieved 22 February 2014.
  4. ^ Filastò, Arturo. "Tor2web 2.0 is live!". Seclists.
  5. ^ "Hermes Center for Transparency and Digital Human Rights". Retrieved 5 December 2014.