
At a high level, when you connect to Tor, your computer becomes a node and can be used by any other Tor users to relay their traffic. Now that we know a bit about Tor, let’s talk about how it works. The protocol is still being worked on and supported under the Tor Project, a nonprofit organization. Naval Research Laboratory in the 1990s, and Tor itself was developed by the Navy and independent researchers in 2002. Originally, the development of the onion routing protocol was sponsored by the U.S. It is steadily used by journalists, political dissidents and criminals to keep their communications and locations private. People use Tor to keep their privacy, security and anonymity on the internet. Tor stands for “The Onion Router” and it is called so because it is using the Onion routing protocol to conceal information about user activity, location and usage from anyone conducting network surveillance or traffic analysis.


Tor is a software that allows users to browse the Web anonymously. This article highlights some major risks of using Tor in a business network, and provides some recommendations to prevent and/or detect it. On the other hand, it becomes very important for organizations to understand the risks associated with the use of this software in their business network. In a short amount of time, usage of this tool became increasingly widespread amongst business networks and it is now considered one of the largest and most famous anonymity networks available. Therefore, many tools providing anonymity emerged and were made available for the general public. This alone defeats the sole purpose of anonymity on the Internet. Thus, it is possible to identify who is initiating the communication, and for whom this communication is intended. The main reason for this is the fact that in this case only the communication is encrypted it is still possible to know the source and destination of the communication. In these applications, encryption alone cannot maintain the anonymity required by users.

However, anonymity has become a necessary and legitimate aim in many applications (browsing the internet, chatting, sending instant messages etc.). The Internet was not designed with anonymity in mind in fact, one of the original design goals was accountability. Is it Safe to Use a Tor Network in Your Business?
