Our first real donations campaign


Celebrate giving Tuesday with Tor

I am happy to tell you that Tor is running its first ever end-of-year fundraising drive. Our goal is to become more sustainable financially and less reliant on government funding. We need your help.

We've done some amazing things in recent years. The Tor network is much faster and more consistent than before. We're leading the world in pushing for adoption of reproducible builds, a system where other developers can build their own Tor Browser based on our code to be sure that it is what we say it is. Tor Browser's secure updates are working smoothly.

We've provided safe Internet access to citizens whose countries enacted harsh censorship, like Turkey and Bangladesh. Our press and community outreach have supported victories like the New Hampshire library's exit relay. New releases of tools like Tor Messenger have been a hit.

When the Snowden documents and Hacking Team emails were first released, we provided technical and policy analysis that has helped the world better understand the threats to systems like Tor — and further, to people's right to privacy. Our analysis helped mobilize Internet security and civil liberties communities to take action against these threats.

We have much more work ahead of us in the coming years. First and foremost, we care about our users and the usability of our tools. We want to accelerate user growth: The Tor network sees millions of users each day, but there are tens of millions more who are waiting for it to be just a little bit faster, more accessible, or easier to install. We want to get the word out that Tor is for everyone on the planet.

We also need to focus on outreach and education, and on helping our allies who focus on public policy to succeed. Tor is still the best system in the world against large adversaries like governments, but these days the attackers are vastly outspending the defenders across the board. So in addition to keeping Tor both strong and usable, we need to provide technical advice and support to groups like EFF and ACLU while they work to rein in the parts of our governments that have gone beyond the permissions and limits that our laws meant to give them.

From an organization and community angle, we need to improve our stability by continued work on transparency and communication, strengthening our leadership, choosing our priorities well, and becoming more agile and adapting to the most important issues as they arise.

Taller mountains await after these: We need to tackle the big open anonymity problems like correlation attacks, we need to help websites learn how to engage with users who care about privacy, and we need to demonstrate to governments around the world that we don't have to choose between security and privacy.

We appreciate the help we receive from past and current funders. But ultimately, Tor as an organization will be most effective when we have the flexibility to turn to whichever issues are most pressing at the time — and that requires unrestricted funding. It's not going to happen overnight — after all, it took EFF years to get their donation campaigns going smoothly — but they've gotten there, and you can help us take these critical first steps so we can get there, too. By participating in this first campaign, you will show other people that this whole plan can work.

Tor has millions of users around the globe, and many people making modest donations can create a sustainable Tor. In fact, please make a larger donation if you can! These larger contributions form a strong foundation for our campaign and inspire others to give to Tor.

You can help our campaign thrive in three simple ways:

  • Make a donation at whatever level is possible and meaningful for you. Every contribution makes Tor stronger. Monthly donations are especially helpful because they let us make plans for the future.
  • Tell the world that you support Tor! Shout about it, tweet about it, share our posts with your community. Let everyone know that you #SupportTor. These steps encourage others to join in and help to spread the word.
  • Think about how and why Tor is meaningful in your life and consider writing or tweeting about it. Be sure to let us know so we can amplify your voice.

Beyond collecting money (which is great), I'm excited that the fundraising campaign will also double as an awareness campaign about Tor: We do amazing things, and amazing people love us, but in the past we've been too busy doing things to get around to telling everyone about them.

We have some great champions lined up over the coming days and weeks to raise awareness and to showcase the diversity of people who value Tor. Please help the strongest privacy tool in the world become more sustainable!

Anonymous

December 06, 2015

Permalink

> kewl digs

Regarding the concern about the USG possibly suddenly outlawing Tor, or restricting travel of persons who might be considered "dangerous", such as Tor developers and Tor Project leaders: some LANL employees have been urging DHS to install 50-65 "security checkpoints" located 5 to 50 miles from the center of Boston. These checkpoints could range from hard-to-miss border crossing style checkpoints to clandestine stations containing radiological monitors, cameras tied to facial identification databases, detectors which attempt to enumerate the unique identifier of every item of WiFi enabled equipment which passes by the station, etc.

In a staggeringly repugnant use of a method which is probably familiar to many readers of this blog, the LANL employees chose potential locations by converting the Boston road map into a network and applying the Ford-Fulkerson algorithm to determine the minimal cut set. As in, "completely cut off Boston from the outside world". They also urged further checkpoints intended to interrupt all train and airport travel in or out of Boston, whenever the USG desires.

The LANL snoops want to install similar checkpoints surrounding 49 other major American cities.

Anonymous

December 06, 2015

Permalink

can anybody plz tell me why tails is based on debian and not fedora? is debian safer than fedora????

Mostly it's because the Tails people are more familiar with Debian.

But that said, the free software community in general does rally around, and better support, Debian, compared to Fedora. Yay free software community.

Anonymous

December 06, 2015

Permalink

I know this has nothing to do with the topic, however I am new to all this. I just downloaded Tor & I am looking for someone to help me learn what I need to know. if there is anyone out there willing to help a newby please comment on how to contact you. Thanks in advance!

BB

Anonymous

December 07, 2015

Permalink

hi

are the TOR merchandise products listed on cafepress official? do tor benefit from those purchases?

thanks for everything.

is your isp blocking tor ? is it possible to do it ?
inside the eu , the answer is no.

As soon as you pay monthly your bill , they cannot (us secret agent in freelance from a consulate in a foreign country or super-police or spy-cables are off-topic here) because it is in the contract (but a firewall, a server, a monitored connection:computer can do it easily - a member of your family or your teacher can ask to the isp to block it, i.d.).

Usually they run your internet connections in a lan-restricted area using tricks (fake/bad o.s ; compromised updates/dns ; computer with backdoor/malware ; etc.).

If you are in trouble about that ; the first step is to verify and install correctly your o.s and tor then change your dns and set https/noscripts/tor at a safe level.
(e.g uncensored DNS Servers http://blog.censurfridns.dk/en/ip)
the second step is to try onion address, site under control (school/university e.g.) and why not, let us know why, how, where your tor network access is blocked (it is not illegal and even isp promote its usage ; it is safer with than without).

do not forget that more they are users; more you are protected, more the access is free and uncensored.

Anonymous

December 07, 2015

Permalink

> As a reward for their donation, the donor could receive 10 hours of computer/Tor assistance per year.

I'd be concerned that such "donors" might include V. Putin or C. Koch, and that they'd demand to be assisted in breaking Tor.

I think donors should be encouraged to donate because the world needs more Tor, lots more Tor, not because they are entitled to special treatment or a personal "reward" (beyond that highly coveted T-shirt).

> > As a reward for their donation, the donor could receive 10 hours of computer/Tor assistance per year.

>I'd be concerned that such "donors" might include V. Putin or C. Koch, and that they'd demand to be assisted in breaking Tor.

That's an outlandish scenario. "Hey tech support, I have a very special request..."

Maybe so, but we must all bear in mind that before Snowden's leaks, the mainstream view was that the following claims were all "outlandish", "absurd", or even "insane" [sic]:

o NSA is breaking into internet choke points all over the world in order to spy on all the world's packets

o NSA is determined to read and analyze all the world's communications and data (in motion, at rest)

o NSA is targeting ordinary citizens because they happen to work as Telecom engineers

o NSA is actively targeting large corporations such as Petrobas

o NSA deliberately weakens encryption standards in order to ensure that they can break encryption

o NSA breaks into the networks of smart phone makers to steal the factory installed encryption keys of everyone who buys a phone

o NSA buys zero-day exploits just like the criminals do

o NSA is actively trolling bulletin boards and breaking into social media servers in order to spy on ordinary people

o NSA is exploiting ubiquitous cookies (e.g. Google and single-sign-on schemes) to spy on ordinary people

o NSA is exploiting bug reports to target people with tailored malware

o NSA has made targeting Tor a high priority

I could go on, but you get the idea: all of these outlandish claims turned out to be *true*. Perhaps the most important lesson from the Snowden leaks: nothing is too outlandish for NSA, FBI and other lavishly funded intelligence agencies.

Anonymous

December 07, 2015

Permalink

> While US appeals courts have fallen over themselves in their eagerness to "validate" [sic] this disgusting legal ploy, the ECHR appears to specifically repudiate it:

Just as the USG ignores international courts and tribunals which rule against it, acting upon an obsessive compulsion to achieve some logical consistency with her endemic human rights violations, Russia has responded to the ECHR ruling declaring SORM illegal by declaring that ECHR rulings are illegal in Russia:

http://www.theregister.co.uk/2015/12/07/russia_new_law_restrains_echr_j…
Putin's Russia outlaws ECHR judgments after mass surveillance case
Lower house says gov can ignore inconvenient European rulings
Alexander J Martin
7 Dec 2015

Dear person who enjoys writing these blog comments:

Could I convince you to learn how to use the 'reply' button when writing comments? That way the comment threads will be, well, threaded. :)

Thanks!

Yes, exactly that one.

Except to me it's green on white, and easy to spot.

You must hate this blog format. I sure do look forward to its replacement. :)

Anonymous

December 08, 2015

Permalink

arma how unsafe is it to use a old torbrowser like 3.6.x series.?... I know you say to always stay up to date with latest..... but if one uses older ver does it automatically mean you get hacked?

does the site you are visiting have to have evil code in it for dangers to occur with using old TBB ver? what like switching off javascript would that mitigate the dangers of old tbb

I really think you should listen to arma and use only the current version of TBB.

Many people use the next-most-recent version to get the current version as soon as it becomes available, so if you managed to navigate to this blog while using Tor Browser, you should be able to download the most recent version of TBB using your Tor Browser. Don't forget to verify the detached signature!

Anonymous

December 15, 2015

Permalink

Story making the rounds about someone with questionable taste who probably won't donate to the Tor Project any time soon:

Not long ago, senior FBI agents briefed Director James Comey about a HS website devoted to a rather unusual fetish, involving the navels of adolescent slavs, or some such thing. Anyway, the agents explained how after much effort they were able to definitively identity the person in Russia operating the website. Comey asked why, in that case, the agents looked so glum. What's the hold up, let's ask the Russians to extradite. Then the agents dropped the bombshell: the Russian Federation is very unlikely to extradite the operator, because...

Well let's just say that he's better known as someone who doesn't move his arms when he walks.

A news story supporting the hypothesis that the anecdote might not be entirely apocryphal:

http://arstechnica.com/tech-policy/2016/01/putins-top-internet-adviser-…
Putin’s top Internet adviser seems to own a piracy torrent site
Site owner is also head of Russia's Internet Development Institute.
Glyn Moody
20 Jan 2016

> Vladimir Putin's special adviser on the Internet, German (Herman) Klimenko appears to be the owner of a Russian torrent website, according to an investigation by TorrentFreak.
> ...
> Klimenko became Putin's special adviser on all things Internet earlier this month.
> ...
> The site is torrNADO.ru, a pun on the Russian phrase "torrenti nado?"—do you need torrents? It offers the usual range of films, music, games, software, and e-books, all for free, and so presumably pirated.
> ...
> Klimenko's loyalty to his boss probably explains how he manages to be the country's top Internet official while downplaying the urgency of dealing with piracy in Russia.

Anonymous

December 19, 2015

Permalink

Roger, What about Bitcoin?

There is everything to create 10000% of new Exits and Middles easy & simply with Bitcoin.

1) Let everybody put his own Bitcoin address to the "Nickname field".

2) Publish ONE and only ONE Bitcoin address for Donation to the Tor Project in the Top of torproject.org site.

3) Spread Bitcoins each day / week / month from this address to the Nicknames addresses according to the atlas.torproject.org info.

All this data would be checked easy by blockchain.info and little peace of code on the torproject.org site side.

Cheers!

Anonymous

January 10, 2016

Permalink

@ Shari:

The following suggests that word is not getting out about the Funding Drive. Maybe someone should email another announcement to tor-talk?

Subject: Funding Tor Development trough Referral/Affiliate Marketing
From: Scfith Rise up
Date: Jan 10 2016

> I didn't realize The Tor Project needed to investigate other options to raise more money. They have a decently paid staff, and plenty of beneficiaries. At least according to their 2013 tax filings. So, while your idea is interesting, this is a solution seeking a problem with the wrong entity.

By the way, the suggestion from naif is so awful that I can't believe he said it. Not that I think you would even consider such a thing, but obviously spoofing headers without the permission/knowledge of the user is just the kind of thing Tor is against, not the kind of thing it should ever considering doing.