Strength in Numbers: Double Your Donation with Mozilla’s Match


Strength in Numbers. That’s the key to ensuring privacy and freedom online.

2018 has been a great year for the Tor Project. Censorship and surveillance are increasing around the world, but we have banded together to take a stand against invasive and restrictive online practices with hopes of bringing privacy and freedom online to all.

The organization grew both in size and budget. The network grew both in users and relays. We built up our UX and Community teams, and they visited some of our most vulnerable Tor users--in places like Colombia and Uganda--gathering information face-to-face to make Tor more accessible. We used that information to build Tor Browser 8, the most user-friendly Tor Browser ever. And to reach even more people in repressed areas of the world--where most access the internet exclusively through their phones--we released the first Tor Browser for Android.

We’re excited to continue this important work in 2019. And we can’t do this without our community, our partners, or without our supporters.  

The Tor Project has a bold mission: to take a stand against invasive and restrictive online practices and bring privacy and freedom to internet users around the world. But we can’t do it alone.

Countries like Egypt and Venezuela have tightened restrictions on free expression and accessing the open web; companies like Google and Amazon are mishandling people’s data and growing the surveillance economy; and some nations are even shutting off the internet completely to quell possible dissidence. 

Today we launch our end-of-year campaign, Strength in Numbers. Your support, along with the support of many others, can ensure the Tor Project’s success into the future and ensure we can keep listening to the critical voices of those who need Tor the most.

This year, with your support, we can also:

  • Increase the capacity, modularization, and scalability of the Tor network, making improvements and integrations into other privacy and circumvention tools easier and more reliable;
  • Better test for, measure, and design solutions around internet censorship, allowing people around the world living under repressive governments to access the open web safely and privately; and
  • Strengthen our development of Tor Browser for Android, now in alpha, and make sure it’s in tip top shape to reach the rising number of people around the world who only access the internet from a mobile device which may have low bandwidth and a costly connection.

As part of our year end fundraising campaign, Mozilla will be matching every dollar donated to Tor, so your impact will be doubled.

Donate button

Make a donation today, and you can be counted as one of the stakeholders bringing safe and private internet access to people worldwide.

Because of Mozilla’s generous support, there’s never been a better time to make a gift to the Tor Project. Every little bit helps. Because there is Strength in Numbers.

Thank you for your help, and thank you, Mozilla.



October 23, 2018


How come you don't have a way to donate via bitcoin? Ironic that there is no anonymous way to donate to a project promoting anonymity.


October 23, 2018


So you're saying that the TOR network becomes safer, faster, and more secure directly because more people are using it?

In that case, why isn't everyone using it? It's free, and it can keep you safer on the web! It sounds too good to be true; but it isn't, because it's open-source. if there was a flaw or backdoor in the network, the developers and the unknown number of users would crowdsource the location of the problem, and fix it.

Indeed the Tor network becomes stronger the more people use it. The more people that use the Tor network, the harder it becomes to identify any one person. However, the more
people that use the network, the slower it will become, this is why we continually need more and more relays, exit nodes as well as bridges and finally PTs. Imagine if the
whole connected world jumped on to Tor, it would be great for anonymity, but not so great for performance. Getting back to the point "Strength in numbers", by using the Tor
network you are actively helping other users on the network to stay hidden.

I hate it when people spread misinformation like "Don't use Tor unless you absolutely need it", that's not true! In fact, the Tor project encourages everyone to use it! It
helps "normalize" the network, it'll look less suspicious if more people used Tor. It doesn't matter if is a life or death situation, or if you just want to
look at memes, or read the news, or watch youtube, or to post comments in an online community. It keeps you safe, and everyone else too.

As to why everyone doesn't use Tor, well I guess there are multiple reasons. First there's the stigma created by the media (only for criminals blablabla,
you've all heard it), then there's the simple fact that people don't know about it, then there's the prevalence of VPNs and their marketing, (no, it's NOT an anonymity
solution! If you want to "hide from your ISP", use an obfs4 bridge/pluggable transport), then there's people whose internet priorities don't include electronic privacy,
instead they value low latency and bandwidth. Also people think Tor is as slow as the 1990's internet, think dial-up. That's not true either. While you won't get gigbabit
speeds with Tor and perhaps not even fast ethernet speeds, it's not unbearably slow.

I'm sure there are more reasons than those listed, remember that Tor has limited marketing and promotion, and a bad reputation to overcome, it's the reason it's not as
popular as it could be. Still, if you look at Tor metrics, it's actually a lot more popular than the top online multiplayer games on steam combined! That's what an article I
read online said, and that's a huge success if you ask me.


October 24, 2018


This is the best change Google gonna have to bankrupt Mozilla and eat Firefox's market share. Just donate 100M to Tor :-)

Vital information for those living on a fixed income who must budget each month!

How confident are you that USPS is actually delivering your mail? Have you sent yourself test mail from various return addresses unconnected with Tor containing cheques? Last year my cheque was never deposited.

We have received several donations in the postal mail already this month - many of these have been from anonymous donors. Please make sure you use our current address:

The Tor Project, Inc.
P.O. Box 4903
Seattle, WA 98194 USA

If your check isn't deposited within a couple of weeks, please contact giving at torproject dot org. We appreciate your support!


October 30, 2018


"so if you give today, you can double your impact"

In getting financially tracked and put under surveillance by governments.
Thats not the kind of impact that we like.

I think you are expressing the fear (well founded, alas, on the basis of the Snowden leaks) that USG will mark you for extra-intrusive surveillance if they notice you sending money to Tor Project. I hope you did not mean to imply that you believe this fear is a valid reason not to congtribute. Because, it seems to me, Tor is almost the only technical tool left which is helping prolong the long death of democracy and freedom around the world. With enough contributions from ordinary people, Tor can survive long enough for us to document our own deaths from global warming, nuclear war, economic collapse, global famine, etc., and I think we'll find that has value. We'll soon want to express our grief and fury during our cruel and needless death throes, and Tor, if it is still available, will allow us to do that. But if the enemies of the truth, justice, and happiness have their way, the rest will be miserable silence.


November 01, 2018


do consider safe guards being arranged in the event that mozilla etc. is compromised somehow, perhaps discreetly, that would protect the torbrowser yes?


You are concerned with a potential technical threat--- there are alas many other such which TP must confront and try to ameliorate day by day--- but there equally serious political threats. Bear in mind, TP is based in the US, where the very concept of unbackdoored encryption (which is fundamental to Tor) is under dire threat (regardless, it seems, of the outcome of the mid-term election):
Midterm vote to set cyber agenda
Jacqueline Thomsen and Olivia Beavers
4 Nov 2018

> The heated encryption debate could come to a head after the midterms. Privacy hawks and law enforcement officials have long battled over whether devices developed by the private sector should have loopholes to allow authorities to tap into devices or services in important investigations. But top Trump administration officials have ramped up pressure on tech companies in recent months to provide access to such systems, threatening to take action, including through legislation. The discussion around stopping what law enforcement officials describe as “going dark” could be upended if Australia passes a new anti-encryption bill into law. Critics have warned that bill could pave the way for similar legislation in the U.S. Australia, which is one of the U.S.’s five intelligence-sharing allies, would in part require companies to build a back door -- or face a steep fine. The bill has sparked an uproar among multinational companies like Google and Apple, which have opposed giving authorities workarounds to their encrypted products. The battle over encryption spilled into the public eye when the FBI and Apple fought over access to an iPhone belonging to one of the San Bernardino terror attackers in 2016. And the debate was revived this year when Trump officials began wondering whether to press Congress for legislation mandating encryption back doors. While Trump sided with the FBI as a Republican presidential candidate, it is unclear what stance he would take if the encryption debate flares up again.

For more on the horrid precedent sent by USG's strongest FVEY partner, AU, see:
Australian bill spells trouble for data privacy around the world
Satyajeet Marar
4 Nov 2018

> .. the bill will effectively require tech companies and platforms like WhatsApp and Facebook to build “vulnerabilities” or “backdoors” into their own products and services so government agencies can access the private data of their users on-demand — with virtually no judicial oversight. Shockingly, the bill could even ban companies from informing their customers about these weaknesses.


November 09, 2018


I notice that the 'tor conferences' info for 2019 is blank. Has there been any talk of where and when they might be held in 2019? I ask because I am very interested in attending, but I have to submit a request soon (company is doing 2019 budget now). Apologies if this is discussed elsewhere and I missed it. I looked around and could find nothing about it.


Join the discussion...

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

1 + 12 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.