Över en miljon ansluter till Facebook via Tor
Ökningen av antalet Facebookanvändare som ansluter till det sociala nätverket via anonymitetstjänsten Tor har ökat lavinartat under det gångna året. Det avslöjar Facebook, som hävdar att över en miljon människor nu loggar in på Facebook via Tor varje månad.
Så sent som i juni 2015 låg motsvarande siffra på runt 525 000 användare. Facebooks utvecklare Alec Muffett säger i en kommentar till saken att det är viktigt att Facebook tillhandahåller möjligheten att ansluta på sätt som gör att folk känner sig säkra.
Tor på Wikipedia
Wikipedia (en)
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router, however, the correct spelling is "Tor", capitalizing only the first letter. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.
Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.
An adversary might try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user's computer. The NSA has a technique that targets a vulnerability - which they codenamed "EgotisticalGiraffe" - in an outdated Firefox browser version at one time bundled with the Tor package, and in general, targets Tor users for close monitoring under its XKeyscore program. Attacks against Tor are an active area of academic research, which is welcomed by the Tor Project .
Omni är politiskt obundna och oberoende. Vi strävar efter att ge fler perspektiv på nyheterna. Har du frågor eller synpunkter kring vår rapportering? Kontakta redaktionen