Skip to main content

Twitter’s Tor Tool Topples Totalitarianism

After Russia's ban, Twitter has quickly launched its Tor onion service to allow anonymous use of the micro-blogging service.


Twitter's Tor service has been under development for some years, but the recent Russian ban kickstarted its public launch. Now, anyone can access Twitter through an anonymizing Tor browser, which has two big effects. One, it stops authorities from tracking users' use of Twitter, making it safer to access the site and to use it to disseminate and read information. Second, it lets you work around governmental blocks. 

https://www.engrainetoi.com/smartblog/7_Trucs-et-Astuces.html

https://www.iloveitallwithmonikawright.com/2010/08/free-download-and-tutorial-address-book.html


"A connection from a regular browser may be encrypted to restrict a third-party easily accessing the content, but the connection itself is trackable or can be blocked and monitored. The Tor browser works by establishing an encrypted connection to the Tor network," security evangelist Tony Anscombe told Lifewire via email.


The Onion Router

Tor is an acronym derived from The Onion Router. It's a voluntary network of more than 6,000 computers around the world that relays your internet traffic through many layers to hide your location and stops anyone from knowing which websites you visit.


"The Tor browser works by establishing an encrypted connection to the Tor network; traffic is then routed through several random servers within the network before eventually transitioning onto the public internet, with the final relay becoming the requester of access to the service," said Anscombe.

https://awednesdayafternoon.blogspot.com/2009/09/book-pocket-for-bed-or-armchair.html

It’s an important tool for avoiding surveillance and censorship, but it is more of a privacy guard than full protection. Both UK and US national security services have targeted Tor in the past, although with mixed success.


Tor is used by journalists and activists, but when a government attempts to cut off access to outside news sources, it also becomes useful for regular users, letting them stay in touch with more neutral news sources.


Twitter’s Tor

But why does Twitter need to be involved at all? Can't you just browse Twitter's website using a Tor browser? You could indeed, but this still requires a standard internet connection at the other end of the Tor network, a connection that could be traced. Twitter's new tool provides a direct link, instead. 


"However, there is still the hop from the Tor network onto the public network that requires resolution of a website address; through DNS," says Anscombe. "This can now be avoided by using the new Twitter Onion address. This is specific and direct, requiring no resolution over a public network."

http://www.affnanaquaponics.com/2010/08/aeration-trying-to-get-most-from-siphon_26.html

Twitter's Tor plans began long ago. In 2014, Twitter's network security engineer Alec Muffet led the team that created Facebook's onion. "There have been occasional conversations re: 'an onion for Twitter' ever since," says Muffet on Twitter. 


What’s In It for Twitter?

This makes perfect sense for users. Twitter is a great way to publicly share information quickly. Anonymizing this is not only good for escaping the grip of various political regimes, but it’s also good for whistleblowers, journalists, and anyone else who doesn’t want to be traced. It applies to everyone.

https://dailythoughtsonmytots.blogspot.com/2010/04/make-way-for-ducklings.html

But why does Twitter care? One reason might be that it really does care about freedom of speech and wants to use its platform to foster that. It might be a huge global mega-company, but it’s also a Californian tech company, and that tends to be all about free speech and the like, even when it’s not such a great idea. 


Comments

Popular posts from this blog

Webroot Antivirus Software Gives The Clients Basic And Simple To Work Interface

Through Webroot Secure Anywhere, You can protect your computer, pc, and other devices from malware, virus, spyware, etc. With webroot.com/safe, you can download, install webroot with key code. After it, you have to follow the process of webroot key code activation. http://www.gerechtsdeurwaarder.bbforum.be/post1649.html http://www.gerechtsdeurwaarder.bbforum.be/post1815.html http://www.gerechtsdeurwaarder.bbforum.be/post1036.html https://forums.workpermitvisas.in/index.php?topic=33498.0 https://forums.workpermitvisas.in/index.php?topic=33495.0 http://www.onlinearabic.net/forum/forum_posts.asp?TID=8554 http://hub.cdp.res.in/myspace/showthread.php?tid=715552 https://turbotraffic.net/forum/showthread.php?tid=20420 The Webroot antivirus software gives you basic and simple to work interface and can be utilized by each PC client without confronting any single issue. Webroot antivirus accompanies some astounded highlights which upgrade the Webroot web security and consistently disch...

What Is Antivirus?

Antivirus is a type of computer program that's designed to seek out and remove computer viruses that have infected your computer. They can also block your system from getting infected with new viruses. There are antivirus programs available for every operating system, including Windows, Mac OS, Android, iPhone, and even Linux. https://www.eroticillusions.com/forum/viewtopic.php?f=34&t=367591 http://welcome2solutions.com/forum/topics.aspx?ID=35850 https://www.eroticillusions.com/forum/viewtopic.php?f=34&t=367794 http://forum.mieszkaniowy.com/-vp168559.html http://emeraldcitycycle.com/showthread.php?p=638240 http://aena.at/phpbb3/viewtopic.php?f=5&t=11715 http://forum.echo.or.id/forum/viewtopic.php?f=26&t=174269 http://www.flyingfish.nl/forum/viewtopic.php?p=2433176 The word "antivirus" is a misnomer, considering that most of these applications can also clean any form of malware from your system, not only viruses. The Threat of Malware The presence of viruse...

What Is a Computer File?

A file, in the computer world, is a self-contained piece of information available to the operating system and any number of individual programs. A computer file can be thought of much like a traditional file that one would find in an office's file cabinet. Just like an office file, the information in a computer file could consist of basically anything. http://www.labvirtus.com.br/lab/showthread.php?tid=5196 http://beta.cqpolska.pl/showthread.php?tid=167108 http://theauctionboard.com/showthread.php?tid=892942 http://wastedwarlocks.com/forums/showthread.php?tid=151948 https://www.eclipse-gaming.de/forum/showthread.php?mode=threaded&tid=6884&pid=9543 https://cerberus-chain.be/showthread.php?tid=11183 More About Computer Files Whatever program uses an individual file is responsible for understanding its contents. Similar types of files are said to be of a common "format." In most cases, the easiest way to determine a file's format is to look at the file's exte...