1000 word essay and 500 word rationale

  • Category:
    Business
  • Document type:
    Article
  • Level:
    Undergraduate
  • Page:
    1
  • Words:
    696

Rationale for Critical Analysis of Tor Project

Through the analysis of this paper, a lecture 5 topic has been chosen in regard to internet. Currently, policies and laws around the internet usage and the technology in general have been narrowed down to strictest elements and therefore infringing the privacy of internet users while online. The rapid change and growth in the amount of information one can get on the internet is overwhelming and this has. Traditionally, the governments restricted access to certain websites by blocking the entire site in the country and this inhibits some of the activities citizens may have towards the websites and there arose need for ways to bypass the restriction (Banks, 2013). This paper analyses the Tor Project privacy program which provides online anonymity to the users with reference to theory of networked generation and application of the article ‘Who Controls the Internet’ (Goldsmith & Wu, 2006).

The devices using Tor have the ability to access the internet without being analyzed through traffic analysis (Garcia, 2014). Through the networking of many random hard to follow paths on the internet which are erased periodically makes it impossible for any observer to trace the origin and destination of the content being sent over the internet (Jardine, 2016). Tor achieves this by providing the necessary clients like Tor Browser and Tor operating system which reorganizes the IP configuration of the devices and therefore, apart from securing the content of the information sent, it also shields the location of the information sender or recipient. By so doing, Tor ensures privacy of the communication for private businesses, state communication among other forms of communication that requires end-to-end encryption.

On the other hand, the privacy can be abused by users who conduct risky operations like hacking and piracy. Such users enjoy the anonymity in such a way that they are aware the fraud cannot be traced back to them and therefore, in regard to the theory of networked generation, the information on the internet has to be zoned to regulate on how much the browsing can be anonymous (Lapidot-Lefler & Barak, 2012).

During the preparation of this paper, I conducted survey regarding the Tor usage in institutions. The data I collected varied from the necessity of Tor Project by students and how helpful tor has been to the students and also covered the definitions of terminologies under the case.

By analyzing the impact Tor has on privacy of internet user, I realized that Tor in many ways has theoretical basis which coincides with the themes of social development and geographical regard while on the global network (Weinberg et al, 2012).

The rise in criminal activities due to anonymity was found to be a hindrance to development of Tor Project and therefore, it becomes necessary for the developers to prove means on how Tor can be applied for positive essence while minimizing the possibility for fraud (Larsson et al, 2013).

The anonymity nature of the browsing over Tor makes it impossible to get sufficient data on the extent to which it is being used across institutions and worldwide at large (Macrina, 2015).

References

Banks, J. (2013). Hello Avatar: Rise of the Networked Generation.

Garcia, R. (2014). Preventing tor DNS leaks. The Tor Project.

Goldsmith, J., & Wu, T. (2006). Who controls the Internet?: illusions of a borderless world. Oxford University Press.

Jardine, E. (2016). Tor, what is it good for? Political repression and the use of online anonymity-granting technologies. New Media & Society, 1461444816639976.

Lapidot-Lefler, N., & Barak, A. (2012). Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in human behavior, 28(2), 434-443.

Larsson, S., Svensson, M., & De Kaminski, M. (2013). Online piracy, anonymity and social change Innovation through deviance. Convergence: The International Journal of Research into New Media Technologies, 19(1), 95-114.

Macrina, A. (2015). The Tor browser and intellectual freedom in the digital age. Reference & User Services Quarterly, 54(4), 17.

Weinberg, Z., Wang, J., Yegneswaran, V., Briesemeister, L., Cheung, S., Wang, F., & Boneh, D. (2012, October). StegoTorus: a camouflage proxy for the Tor anonymity system. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 109-120). ACM.