That says cofounder Roger Dingledine in a blog post.
Tor, which stands for The Onion Router is used to surf anonymously and packed data in different layers. Then the Tor software sends the data through various Tor servers, which is generated every time layer of the data packet reached.
The attackers would have aimed their arrows on specialized servers that the Tor traffic tell where the need to go. Without those servers anonymous network is unusable.
“We hope this does not happen. Tor is used by many good people, and by banks, diplomats, bloggers and many others. Attempts to disable the Tor network would not only affect people in which the hackers have coined it, but also all these
The developers of Tor say to take steps to ensure the security of Tor users, but stressed that the Tor systems have been set up so that the anonymity of users is gewaardborgd when the systems are hacked.
By whom any attack would be carried out, is not clear. “We would like to give more information, but we do not know much more than this,” said Dingledine. “Our first plan was to do nothing and hope that nothing would happen. When we realized that that was a crazy plan.”
Read what Tor is and how you can use it


No comments:
Post a Comment