

Many onion services host websites, chat sites and video calling services. Technology, as more people use the system, legal and ethical uses become far more common than illegal ones. While criminals are frequently early adopters of anonymity Their name comes from the fact that, like Tor users, their identities and activities are protected by multiple layers of encryption, like those of an onion. Onion services continuously come online and offline, though, so it is difficult to obtain exact numbers. They will improve security and anonymity for existing Tor users and perhaps draw additional users who were concerned the prior protections were not enough when communicating and expressing themselves online.Īs of March 2017, an estimated 50,000 onion services are operating on the Tor network. The upcoming changes will fix flaws in the system’s original design, and employ modern-day cryptography to make the system future-proof. That makes it much harder for authorities or opponents to take down. My own work as a scholar and volunteer member of The Tor Project also looks at the network’s way of allowing people to host websites privately and anonymously, which is where most of the upgrades to the system will come.Ĭalled “onion services,” this element of the Tor network makes it possible for a person to run a website (or filesharing site, or chat service or even video calling system) from a dedicated server or even her own computer without exposing where in the world it is.

Tor bounces web traffic over three randomly selected Tor relays out of a total of around 7,000 relays.īut those users are still, generally speaking, using others’ websites, which can be shut down or pressured into censoring online activity.
