
Speaking as a lifelong (?) security and network engineer: At its core “Tor” is a separate network stack, layered on top of TCP/IP, and it should be treated as such.įolk have a tendency to conflate “Tor” with “Tor Browser” and thence to think of the whole as some kind of “anonymity app” and then they bring a whole bunch of social prejudices along with their descriptions. I don’t think I encountered Andrew when he was at the Tor project according to Google he left in April 2015, and I didn’t start to become a credible source on any aspect of Tor until several months after that - once all the “ let’s ratify the onion top level domain name” stuff began to gain momentum.Īndrew’s schtick is pretty-much what I would expect from people who have bought into the mythos of “THE DARK WEB” as being something from which folk need to be protected, or similar. This was my response, mildly edited for flow, grammar & typos, and with links added.

Tor is End-to-End Encryption for Computers to talk to other ComputersĪ Journalist asked me some background about Tor to balance some perspectives and commentary in an interview with Andrew Lewman.
