Statements (53)
Predicate | Object |
---|---|
gptkbp:instanceOf |
anonymity network
|
gptkbp:abbreviation |
TOR
|
gptkbp:alternativeTo |
gptkb:VPN
gptkb:Freenet gptkb:I2P proxy servers |
gptkbp:architecture |
distributed network
|
gptkbp:category |
gptkb:software
Cryptography Internet privacy Computer network security Censorship circumvention tools |
gptkbp:component |
gptkb:Tor_hidden_services
gptkb:Tor_network gptkb:Tor_Browser Tor relays |
gptkbp:developer |
gptkb:The_Tor_Project
|
gptkbp:enables |
anonymous publishing
anonymous file sharing anonymous instant messaging anonymous web browsing |
gptkbp:features |
traffic analysis resistance
end-to-end encryption (within network) location hiding multi-layer encryption |
gptkbp:firstReleased |
2002
|
gptkbp:fundedBy |
various organizations including US government grants
|
https://www.w3.org/2000/01/rdf-schema#label |
The Onion Router
|
gptkbp:license |
gptkb:BSD_license
|
gptkbp:notableUser |
activists
general public journalists whistleblowers |
gptkbp:operatingSystem |
Cross-platform
|
gptkbp:purpose |
enable anonymous communication
|
gptkbp:relatedTo |
gptkb:Freenet
gptkb:I2P onion services |
gptkbp:supportedBy |
volunteer-operated servers
|
gptkbp:supportsProtocol |
onion routing
|
gptkbp:usedFor |
bypassing censorship
accessing the dark web protecting user privacy |
gptkbp:vulnerableTo |
exit node monitoring
malicious relays traffic correlation attacks |
gptkbp:website |
https://www.torproject.org/
|
gptkbp:writtenBy |
gptkb:Python
C |
gptkbp:交通方式 |
gptkb:TCP
UDP (limited support) |
gptkbp:bfsParent |
gptkb:tunnel
|
gptkbp:bfsLayer |
5
|