Tor and Anonymity Systems

Tor and other anonymity systems are a class of tools and protocols within computer science designed to conceal a user's identity and online activities from surveillance and traffic analysis. The most famous of these, Tor, operates on the principle of "onion routing," where user traffic is wrapped in multiple layers of encryption and relayed through a distributed, worldwide network of volunteer-run servers. Each relay, or node, in the path decrypts only one layer to reveal the next hop, meaning no single point in the circuit knows both the original source and the final destination. This cybersecurity mechanism effectively severs the direct link between a user and the services they access, providing a powerful means for journalists, activists, and private citizens to protect their privacy and circumvent censorship.

  1. Introduction to Anonymity and Privacy
    1. Fundamental Concepts
      1. Anonymity
        1. Definition and Properties
          1. Degrees of Anonymity
            1. Anonymity Sets
            2. Pseudonymity
              1. Persistent Identities
                1. Linkable vs Unlinkable Pseudonyms
                2. Unlinkability
                  1. Action Unlinkability
                    1. Identity Unlinkability
                    2. Unobservability
                      1. Traffic Unobservability
                        1. Content Unobservability
                      2. Privacy vs Anonymity Distinction
                        1. Data Privacy
                          1. Identity Privacy
                            1. Behavioral Privacy
                            2. Motivations for Online Anonymity
                              1. Protection from Surveillance
                                1. Government Surveillance
                                  1. Corporate Surveillance
                                    1. Mass Data Collection
                                    2. Circumvention of Censorship
                                      1. Accessing Blocked Content
                                        1. Bypassing Regional Restrictions
                                          1. Information Freedom
                                          2. Whistleblowing and Journalism
                                            1. Source Protection
                                              1. Secure Communication Channels
                                                1. Investigative Reporting
                                                2. Personal Privacy
                                                  1. Avoiding Behavioral Profiling
                                                    1. Preventing Data Aggregation
                                                      1. Location Privacy
                                                      2. Political Dissent
                                                        1. Authoritarian Regimes
                                                          1. Protest Organization
                                                            1. Free Expression
                                                          2. Threats to Online Anonymity
                                                            1. Network-Level Threats
                                                              1. Traffic Analysis
                                                                1. Passive Traffic Analysis
                                                                  1. Active Traffic Analysis
                                                                    1. Statistical Analysis
                                                                    2. Eavesdropping
                                                                      1. Network Packet Capture
                                                                        1. Man-in-the-Middle Attacks
                                                                          1. SSL/TLS Interception
                                                                          2. IP Address Tracking
                                                                            1. Direct IP Logging
                                                                              1. IP-based Geolocation
                                                                                1. ISP Cooperation
                                                                              2. Application-Level Threats
                                                                                1. Browser Fingerprinting
                                                                                  1. Device Fingerprinting
                                                                                    1. Canvas Fingerprinting
                                                                                      1. Font Enumeration
                                                                                        1. WebRTC Leaks
                                                                                        2. Tracking Technologies
                                                                                          1. HTTP Cookies
                                                                                            1. Supercookies
                                                                                              1. Web Beacons
                                                                                                1. Local Storage
                                                                                              2. Correlation Attacks
                                                                                                1. Timing Correlation
                                                                                                  1. Content Correlation
                                                                                                    1. Behavioral Correlation
                                                                                                    2. Social Engineering
                                                                                                      1. Information Disclosure
                                                                                                        1. Identity Correlation