Tor is software that routes and encrypts information transmitted online in ways that can protect it from prying eyes. Credit: Tor Project
icon to expand image

Tor is software that routes and encrypts information transmitted online in ways that can protect it from prying eyes. Credit: Tor Project

Anonymity online can strike some as scary; what, some argue, do you need to be doing online that requires you to hide your identity if not mischief? In fact, journalists, whistleblowers, activists in censorship-prone countries and people simply hoping to protect themselves from identity thieves may opt to keep their activity private online. One tool for doing that is Tor, which has built a following of millions of users.

Tor, built out of the volunteer-driven "Tor Project," encrypts data and routes it through hidden servers, shielding the information and its origin from prying eyes. It gained notoriety when NSA whistleblower Edward Snowden used it in his communications with journalist Glenn Greenwald. You can download Tor software and find out more at torproject.org.

Though Tor is widely used, it's not perfect. MIT and the Qatar Computing Research Institute recently discovered a vulnerability in the way Tor transmits information. But the groups also promised a fix they hope to offer soon.

In this space every week, we’ll define a tech term, offer a timely tip or answer questions about technology from readers. Email ogallaga@statesman.com.