Strength in Numbers: The Final Count Is In

One of the Tor Project’s ongoing goals has been to diversify our funding sources. We are pleased to announce that in 2018, we raised over $460,000 from individuals like you who use Tor for your personal privacy and who understand the importance of making Tor available to everyone. Together, we raised more donations from individuals than ever before.
Almost half of our total income from individuals in 2018 was raised during our year-end campaign. There truly is strength in numbers. Every donation--whether it is $2 or $1,000--supports us on the ground speaking with activists, journalists, and internet users in countries all over the world, teaching them about Tor and online security, and supports Tor’s development, helping us keep Tor the world’s strongest tool for privacy and freedom online. Thanks to Mozilla’s generous match, each gift made between October 23 and December 31 was matched.
In addition to Mozilla’s match, a generous anonymous donor offered to match all new donor contributions up to $20,000. This challenge was met in less than 20 days and, throughout the entire campaign, we received gifts from 2,029 new donors who gave more than $97,000.
Tor users are from all over the world, and so are our donors. In 2018, people from 115 countries came together to take a stand against tracking, surveillance, and censorship on the web by supporting the Tor Project.
During the campaign alone, we gained 100 new monthly donors! Sustaining gifts provide the Tor Project with steady, reliable income that is essential to our ability to respond quickly to unexpected challenges and threats.
Beyond raising the income we need to carry out our work, this year-end campaign was an opportunity to reflect on the ways in which people have come together to fight for privacy. We featured stories about how Tor Project staff members work directly with librarians, Tor users in at-risk communities, human rights defenders in communities experiencing internet censorship, and developers of applications that rely on Tor’s technology. We wrote about how we are constantly working to diversify the Tor network to increase sustainability and ensure users are more secure. We wrote about our efforts to localize our tools and resources, moving closer to our overarching goal of making Tor accessible to everyone.
We are so grateful to everyone who financially supported the Tor Project in 2018. As Isabela Bagueros said in her first blog post as Executive Director, donations from individuals allow us to “easily allocate resources to whatever important events that requires our response, and reorder our priorities whenever needed. This is extremely important for any software development organization, especially one that provides essential safety to people in volatile locations like Tor.” And your support counts all throughout the year, not just during our campaign.
Some big tech companies rely on invasive practices to gather, and subsequently sell, your data--and that's how they generate their revenue. By donating to the Tor Project, you are supporting an alternative model, where personal privacy is of utmost importance.
You make a difference. You make a better internet possible. Thank you.
Sincerely,
The Tor Project Fundraising Team
As a right wing person, Tor…
As a right wing person, Tor user and advocate myself (libertarian rather than republican) I think I agree that more people on the right use Tor. Though not looking for 'Tor users' at the time, I have met people who are indeed regular users of Tor and get clear benefits from its use. For them it's about practical solutions to real problems. I think it remains true that anonymity loves company whatever your political alignment - though some things I find a little puzzling to see.
> it's about practical…
> it's about practical solutions to real problems. I think it remains true that anonymity loves company whatever your political alignment
Exactly. I always encourage everyone to use Tor, and I do not inquire about their political beliefs before I urge them to try to protect themselves better from electronic snooping.
Because anonymity loves company, whenever we persuade anyone else--- regardless of gender, nationality, religion, ethnicity, sexuality, or political beliefs--- to use Tor for everything, we are helping everyone, including ourselves.
In a world in which so much separates so many so far, one thing at least unites us all--- we all need Tor for everything we do.
I couldn't have said it…
I couldn't have said it better. I happened upon this site while browsing wiki post and will be downloading the browser right now. Ty.
Wow, you just made my day! …
Wow, you just made my day!
One bit of advice: TP says (and I agree) that new users of Tor Browser should read
https://www.torproject.org/download/download-easy.html.en#warning
so that you know what Tor Browser can and cannot protect you against.
I hope you find Tor Browser as fab as I do! If so, you might want to try Tails also for even more anonymity/security:
tails.boum.org
Tails Project is based in Europe but is closely allied with Tor Project, which is based in the US. Both projects are to some extent global. Tails is an "amnesiac" OS you use to boot your computer (PC, laptop, tablet, notebook with 64 bit CPU) from a USB, which comes with Tor Browser installed and immediately usable with extra security/anonymity enhancements, plus email, chat, LibreOffice (open source Microsoft Office clone), video editing software, printing, and much more. The general idea is to use your device (PC, laptop, tablet, notebook) without leaving traces of your activity on the hard drive, while still being able to surf the web, view videos, download things (more safely), and to work offline preparing documents or editing videos.
In particular, if you often download and read PDF documents, these often contain embedded links which can deanonymize you. That is why Tor Project recommends reading PDFs you downloaded via Tor Browser offline (after you disconnect from the internet). Tails offers additional protections which will probably protect you against this.
If you use email a lot and want to protect yourself against being deanonymized and tracked by 1x1 gifs or link shimming, reading email using Tails is possibly safer. See also
eff.org
(Don't) Return to Sender: How to Protect Yourself From Email Tracking
Sydney Li and Bennett Cyphers
9 Jan 2019
All new users of Tails should read
https://tails.boum.org/doc/about/warning/index.en.html
so that you know what Tails can and cannot protect you against.
> One of the Tor Project’s…
> One of the Tor Project’s ongoing goals has been to diversify our funding sources.
It is very important to stick to that goal, and very good news that Tor Project is making strong progress towards achieving it!
> As Isabela Bagueros said in her first blog post as Executive Director, donations from individuals allow us to “easily allocate resources to whatever important events that requires our response, and reorder our priorities whenever needed.
That's a good point. TP needs to be flexible in the face of so many technical, political and legal threats all around the world.
Another development worthy of celebration is that some mainstream publications have become more willing to urge ordinary citizens to use "Tor for everything", for example
https://www.wired.com/story/tor-anonymity-easier-than-ever/
Tor Is Easier Than Ever. Time to Give It a Try
Lily Hay Newman
1 Jan 2019
Second only to the onion concept itself, the single biggest advance in "Tor for the people" was the introduction of Tor Browser, and I had hoped that Tor Messenger would be the next great thing which would make Tor usage explode worldwide. S was very transparent about the technical difficulties he was facing and it was tragic that others with the necessary knowledge did not step in to offer ideas and coding help. I hope that TP will try hard to create software which does for chat what Tor Browser did for websurfing, despite the formidable technical obstacles and severe political threats which can be inferred from USIC/Mossad-sourced scare stories about alleged terrorists using scary chat programs.
(Some of these mainstream media scare stories do not lie per se, but do wildly exaggerate the extent of the threat to US citizens while entirely neglecting to mention the many benefits of strong civilian cryptography. I worry that if unanswered by TP, such stories will be used by FBI to build popular support for their "Going Dark" insanity, which directly threatens the very existence of the Tor community. Scare stories in far right venues often do present false statements as factual.)
I worry that USG will threaten TP if you attempt to resurrect TM (which will probably require starting from scratch with a larger team). or even serve you with another (?) NSL, which presumably would cause you to shut down the project rather than comply under duress with an unacceptable USG demand for free access to Tor user chats via TM. If you do try to resurrect TM--- in my view nothing would do more to increase Tor usage worldwide than software which does for chat what Tor Browser did for browsing--- you will need to have a plan for media outreach and so on. While this is easy for me to say, I urge you to consider the possibility of having a designated legal target who will call a press conference and say "TP received an NSL with a gag order which I am violating by giving you copies of the NSL", but I remind you that in every case where people have simply defied a gag order, USG has backed down, for example by saying that they only including a gag order by mistake.
Speaking of NSLs, it seems that Cindy Cohn (your board member from EFF) is involved in a case in which EFF is seeking permission from a US court to reveal one or more NSLs which an unnamed organization has been fighting in the courts. I believe that oral arguments were heard late last year which should mean that a decision will come down in the next few months. I encourage EFF and the unnamed organization to continue the legal battle, and even to consider simply violating the gag order if that is what it takes to get favorable media attention and funding for appealing all the way to SCOTUS.
On the topic of increasing Tor usage: I and perhaps others could use some advice in changing hearts and minds of ordinary citizens who have a strong negative emotional reaction to Tor and to encryption generally. In addition to donating money to TP, I've tried to help the Tor community by encouraging people to use Tor, but results have been poor. If any Tor employees or volunteers have enjoyed success in persuading ordinary citizens (especially vulnerable citizens) to use Tor Browser and other Tor enabled tools, I'd like to hear your tips! Maybe TP can post an essay in this blog?
One US-centric obstacle I have faced, going back the earliest days of Tor, is the deeply entrenched mistaken belief that USG will let you pursue your possibly radical or dissident political beliefs unhindered, provided that you do not use Tor or even encryption. Anyone who has studied the documents leaked by Snowden and others, or read the books by authors such as Tim Wiener and James Bamford, know that this belief is not only the direct opposite of the truth, but also extremely dangerous to those who act upon it.
Another phenomenon I have observed, which is somewhat distressing to a progressive, is that the far right is far more receptive to using Tor and encryption than the left. I think this may have something to do with the assumption, common among leftists, that strong belief in the virtues of transparency (in the sense of open government)--- a belief which I share--- is inconsistent with using encryption or Tor. I see no contradiction: one can be transparent about who you are, what your goals are, and in general what your methods are, while still using encryption and Tor to communicate sensitive data, perform sensitive on-line research, and for discussions which should not be public (one obvious example being discussing emergency measures to mitigate a just discovered security flaw in your network). It seems to me that this unthinking resistance to trying to protect your group from cyberespionage and too easy open-source surveillance is one of the principal reasons why grassroots progressive movements, foreclosure/eviction protests, pipeline protests, land seizure protests, etc, are so easily stymied by the financial/corporate elite and their loyal servant, the USIC, while the far right grows stronger every day.
Leftists have complained for years that FBI regularly attempts to surveil leftist political advocacy groups, while ignoring far more dangerous rightist groups, and many leaked documents suggest that there is considerable truth to this. One reason might be that FBI's biggest goal has always been to enhance it's own public image, which means FBI tends to focus its energies on actions where it expects easy success (such as spying on leftists) rather than on actions where it expects to encounter technical difficulties (spying on cybersecurity-aware rightwing groups) or physical danger (spying on the Proud Boys) or even PR disaster (Ruby Ridge).
Until the outcome of the 2016 election shocked the Democratic Party elite into examining some of the reasons for their Big Fail, I found that these people were also astonishingly resistant to the suggestion that they were guaranteeing failure by insisting (incorrectly as everyone now knows) that no-one would dare to cyberattack them, because "NSA is on the job", snort, but that was more a case of the kind of self-destructive arrogance to which powerful people so often fall prey. That at least is one thing Tor Project leadership probably need not worry about--- TP is still very far from being as influential in US politics as a Pelosi or a Podesta!
Any suggestions?