The Tor anonymity network is enjoying a massive uptick in popularity after two significant privacy-minded events took place earlier this month
First, there were the sudden shutdowns of Lavabit and Silent Circle, two secure email providers that voluntarily closed their doors on Thursday, August 8, rather than allow the U.S. government access to their users' messages.
[ Also on InfoWorld: Tech legal news site Groklaw shutting down, citing email privacy concerns. | Also: Lavabit founder says he can't legally explain why he shut down email service | Lavabit shutdown marks another costly blemish for U.S. tech companies | For a quick, smart take on the news you'll be talking about, check out InfoWorld Tech Brief -- subscribe today. ]
On August 10, mere days after Lavabit and Silent Circle took one for the team, the popular Pirate Bay file-sharing site released its PirateBrowser, a Web browser that allows users to hop onto the Tor network in order to circumvent government firewalls to access torrent sites and other banned parts of the Web.
By August 18, the number of users accessing the Tor network started creeping up, and it has only climbed higher and higher (and higher) since. Tor now regularly sees more than twice as many daily users as it did before the email shutdowns and the PirateBrowser's release.
Differences between Tor browser and the PirateBrowser
While the PirateBrowser and standard Tor software both rely on the Tor network, they use it in very different ways.
Once you've installed Tor's software on your PC -- most often in the form of the Tor browser bundle -- the service allows you to surf the web anonymously by encrypting your Internet connection requests and bouncing them between numerous "relay nodes" before finally sending them on to the final destination.
No node knows the identifiable information of any nodes in the chain aside from the ones they're taking information from and passing information to and., just to be on the safe side, each hop along the way gets a whole new set of encryption keys.
"The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you -- and then periodically erasing your footprints," explains the Tor website. All the hip-hopping makes for a very secure (yet very slow) browsing experience, assuming you're smart about your usage habits. It's also great for bypassing government firewalls.