1.4 The History of the Tor Project

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour 55 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:09
Hello peoples of the Interwebs. This is tensed over and welcome to the next video in our comprehensive guy to the Tor browser. So far we've discussed a clear Web deep with a dark Web and dark net. Now we're moving past all that into the history of Tor Project. Don't worry. Very soon will be in hands on installing Tor browser. Let's go over the pre Rex, which there aren't any.
00:29
This video is on the history of your project that this is your first video with me. Welcome aboard.
00:34
I would recommend going back, though, and watching a previous videos as I deal with misconceptions and definitions of clear Web Deep Web Dark Web.
00:42
Really cool videos, I might say so myself. Then come back and join us here
00:47
beyond catching up this video In terms of pre Rex, there aren't any. As you can read here. Basic networking is a plus, but not required. Also, you basically just have a need and or a want to be anonymous online, especially since I S P s or Internet service providers Ken log all that you're doing
01:06
due to the fact we're in discussions now of the deep Web dark lab and dark net. I'm going to give you the proper tools, teach you how to use them and advise on how to safely navigate the deep Web Dark Web dark Next. With that set, this is not an endorsement of going there illegally at your place of work or home. Nor,
01:23
unfortunately, if anything should happen to you,
01:26
your equipment or any other possessions is cyber ery or myself liable. Please be careful.
01:34
The core principle of tour, which is called Onion Routing, was developed in 1995 by United States Naval Research Laboratory employees mathematician Paul Syverson and computer scientists Mykelti Read and David Gold Flag with the main purpose of protecting US intelligence communications online. Now onion routing is exactly
01:53
we will dig into much more detail on upcoming lesson.
01:57
But I need to know here is that onion routing is a flexible communications infrastructure that is resistant to both eavesdropping and traffic analysis. Onion riding accomplishes is gold by separating identification from routing
02:09
DARPA's, and then you're gonna see on a pattern throughout this video, 1987. In addition to holding our funding toughness, aspects of onion routing are funded by DARPA under High Confidence Network's program.
02:23
Two years later, in 1999 work on onion running development is suspended. There is no new funding for it, plus, most principals and all developers have left the Naval Research Lab for other pursuits. Nonetheless, research and analysis work continued.
02:38
Remember them in 2001 that worked on O. R. Development resumes, funded by DARPA under the Fault Tolerant Network program, with initial goal of making Generation one code complete enough to run a beta network and the subsequent goal of adding fault tolerance and resource management. This same gear,
02:55
the Edison Invention Award, was presented to them for the invention of onion routing
03:00
in 2000. Too many outside changes in the world over the last several years have made life simpler for the tour project, particularly in the proxy area, for example,
03:10
others have done work on freely available filtering proxies, so there was no need to continue writing their own. For cases were filtering of data streams is desired. They adopted privacy for this purpose.
03:23
As viral has become more common, the Sox protocol has not become very common. The Tor project needed to no longer write application proxies for each application
03:31
socks is a protocol processions going across firewall securely. In other words, sock at Secure Socks is an Internet protocol that routes network packets between the client and server through a proxy server. And finally, export restrictions on crypto are no longer an issue. 2003 Tor Network is deployed.
03:53
This is due to the Department of Commerce implementing rules that greatly simplified the export of commercial and open source software containing photography.
04:01
DARPA's Back in 2003 Funding from Owen are for generation to development, and deployment came from DARPA for building and resource management. And fault. Tolerance and even war funding came from the Naval research labs. Internal funding from Owen are for building survivable head servers in October of 2003 Tor Network is deployed
04:20
and Toure Code is released under the Free Open In my tea license,
04:25
both the network and co development, or managed to the tour development site
04:29
by the end of 2003. The network has about a dozen volunteer nodes, most in us with one of Germany location. Hidden Service's are deployed in the spring when the hidden weakest sat up. The tour design paper is published at Use Necks. Security funding from Owen are and DARPA Ends and quarter for
04:47
funding from E F F. Elektronik Freedom Foundation for continue toward employment
04:51
in development begins as well as internal general funding from Owen are for work on location. Hidden servers continues. In December 2006 Roger Dingle, Dine, Nick, Matthew, Son and five others founded a tour project. The Massachusetts based 501 PSI Research Education, a nonprofit organization
05:11
responsible for maintaining tour.
05:13
The F F acted as a tourist project fiscal sponsor in early years in early financial support of the TOR project included the U. S or National Broadcasting Bureau, Internews, Human Rights Watch, University of Cambridge, Google and Netherlands. Based in on that.
05:29
So in conclusion, the Tor Project Incorporated is a nonprofit organization that currently maintains tour and is responsible for its development.
05:39
Now. Funding mainly comes from the United States government, but further aid is provided by the Swedish government. Different non government organizations and individuals, sponsors
05:48
U. S National Security Agency or an essay has called Tour the King of High, secure, low latent see Internet anonymity
05:57
and similar comments by Business Week magazine. Perhaps the most effective means of defeating the online surveillance efforts of intelligence agencies around the world.
06:06
This is a good place to end this lesson. We're going to be picking up with those two quotes we just saw for the next lesson, then fully going into why you should use the Tor browser and its core network.
06:17
And also look at these questions here. When did the core principle of tour start and where
06:23
What are your thoughts on the E f F Electronic Frontier Foundation and what is your thoughts on the Tor browser? And it's one network.
Up Next