To advance human rights and freedoms by creating and deploying free and open source anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding.[1]
In October 2014, the Tor Project hired the public relations firm Thomson Communications in order to improve its public image (particularly regarding the terms "Dark Net" and "hidden services") and to educate journalists about the technical aspects of Tor.[13]
In May 2015, the Tor Project ended the Tor Cloud Service.[14][15]
In December 2015, the Tor Project announced that it had hired Shari Steele, former executive director of the Electronic Frontier Foundation, as its new executive director. Roger Dingledine, who had been acting as interim executive director since May 2015, remained at the Tor Project as a director and board member.[16][17][18] Later that month, the Tor Project announced that the Open Technology Fund would be sponsoring a bug bounty program that was coordinated by HackerOne.[19][20] The program was initially invite-only and focuses on finding vulnerabilities that are specific to the Tor Project's applications.[19]
On May 25, 2016, Tor Project employee Jacob Appelbaum stepped down from his position;[21][22][23] this was announced on June 2 in a two-line statement by Tor.[24] Over the following days, allegations of sexual mistreatment were made public by several people.[23]
On July 13, 2016, the complete board of the Tor Project โ Meredith Hoban Dunn, Ian Goldberg, Julius Mittenzwei, Rabbi Rob Thomas, Wendy Seltzer, Roger Dingledine and Nick Mathewson โ was replaced with Matt Blaze, Cindy Cohn, Gabriella Coleman, Linus Nordberg, Megan Price and Bruce Schneier.[25][26][27][28] A new anti-harassment policy has been approved by the new board, as well as a conflicts of interest policy, procedures for submitting complaints, and an internal complaint review process.[29][30] The affair continues to be controversial, with considerable dissent within the Tor community.[31]
In 2020, due to the COVID-19 pandemic, the Tor project's core team let go of 13 employees, leaving a working staff of 22 people.[32]
In 2023, the Tails Project approached the Tor Project to merge operations. The merger was completed on September 26, 2024, stating that, "By joining forces, the Tails team can now focus on their core mission of maintaining and improving Tails OS, exploring more and complementary use cases while benefiting from the larger organizational structure of The Tor Project."[33][34]
In June 2016, the Tor Project received an award from Mozilla's Open Source Support program (MOSS). The award was "to significantly enhance the Tor network's metrics infrastructure so that the performance and stability of the network can be monitored and improvements made as appropriate."[39]
Tools
Metrics Portal
Analytics for the Tor network, including graphs of its available bandwidth and estimated user-base. This is a great resource for researchers interested in detailed statistics about Tor.
Nyx
a terminal (command line) application for monitoring and configuring Tor, intended for command-line enthusiasts and ssh connections. This functions much like top does for system usage, providing real time information on Tor's resource utilization and state.
Onionoo
Web-based protocol to learn about currently running Tor relays and bridges.
a global observation network, monitoring network censorship, which aims to collect high-quality data using open methodologies, using Free and Open Source Software (FL/OSS) to share observations and data about the various types, methods, and amounts of network tampering in the world.
a library for use by any Android application to route Internet traffic through Orbot/Tor.
Pluggable Transports (PT)
helps circumvent censorship. Transforms the Tor traffic flow between the client and the bridge. This way, censors who monitor traffic between the client and the bridge will see innocent-looking transformed traffic instead of the actual Tor traffic.
Relay Search
Site providing an overview of the Tor network.
Shadow
a discrete-event network simulator that runs the real Tor software as a plug-in. Shadow is open-source software that enables accurate, efficient, controlled, and repeatable Tor experimentation.
Stem
Python Library for writing scripts and applications that interact with Tor.
free software and an open network that helps a user defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. The organization has also implemented the software in Rust named Arti.[40]
a customization of Mozilla Firefox which uses a Tor circuit for browsing anonymously and with other features consistent with the Tor mission.
Tor Phone
A phone that routes its network traffic through the Tor network. Initially based on a CopperheadOS custom ROM prototype,[41] using Tor with Orbot and Tor Browser are supported by custom Android operating systems CalyxOS[42][43] and DivestOS.[44]GrapheneOS supports using Orbot VPN[45] but not Tor Browser.[46]
TorBirdy
Extension for Thunderbird and related *bird forks to route connections through the Tor network.
txtorcon
Python and Twisted event-based implementation of the Tor control protocol. Unit-tests, state and configuration abstractions, documentation. It is available on PyPI and in Debian.[47]
Recognition
In March 2011, the Tor Project received the Free Software Foundation's 2010 Award for Projects of Social Benefit. The citation read, "Using free software, Tor has enabled roughly 36 million people around the world to experience freedom of access and expression on the Internet while keeping them in control of their privacy and anonymity. Its network has proved pivotal in dissident movements in both Iran and more recently Egypt."[48]
In November 2012, Foreign Policy magazine named Dingledine, Mathewson, and Syverson among its Top 100 Global Thinkers "for making the web safe for whistleblowers".[50]
In 2014, Roger Dingledine, Nick Mathewson and Paul Syverson received the USENIX Test of Time Award for their paper titled "Tor: The Second-Generation Onion Router", which was published in the Proceedings of the 13th USENIX Security Symposium, August 2004.[51]
^J. Appelbaum; A. Gibson; J. Goetz; V. Kabisch; L. Kampf; L. Ryge (July 3, 2014). "NSA targets the privacy-conscious". Panorama. Norddeutscher Rundfunk. Retrieved July 4, 2014.