January 26, 2016 By Larry Loeb 2 min read

On Jan. 20, 2016, the Tor Project announced the results of its crowdfunding project.

Over $205,000 was raised from more than 5,200 donors. Contributions were made from personalities such as Laura Poitras, the Citizen Four director; Shari Steele, former EFF executive director; Alison Macrina, the founder and director of the Library Freedom Project; and Tor Project co-founder Roger Dingledine.

The crowdfunding campaign was an attempt to find alternate sources of funding than government and university grants.

Tor Project Gets Funding

As the project put it on its website, “Crowdfunding gives us flexibility to do what we think is most important, when we want to do it. It allows us to fund the development of powerful new privacy tools. Or make the ones we have stronger and more resilient. Or pay for things we need like a funded help desk or an Arabic version of our website.”

SecurityWeek noted that the Tor Project plans to launch a bug bounty program via the HackerOne platform this year. It has also announced ways to improve Tor browser security through a multiprocess sandbox, application-level sandboxing and Mac OS signing. Undoubtedly the new funding will help these efforts.

Problems in Fundraising

But the donation process did not go smoothly in all cases. One user who tried to donate anonymously complained loudly on Tor’s blog. “Any Tor user knows that in the last month, Tor has become unusable on 99 percent of CloudFlare secured websites,” the user wrote. “Users are presented with an impossible CAPTCHA, or even when they are presented with a solvable one, it is interpreted as incorrect. When an audio challenge is given, one number is deliberately unintelligible, or in the event of a solvable audio CAPTCHA, you are still taken to another CAPTCHA.”

Others also expressed their frustration at the difficulty of the donation process, as well as problems Tor has integrating with CloudFlare. That’s because CloudFlare has had a longstanding anti-anonymity policy, and the Tor project has been trying to deal with it — unsuccessfully — for a long time.

Privacy Can Be Misused

It’s not all peaches and cream with Tor — the service has a dark side. In fact, the “IBM X-Force Threat Intelligence Quarterly – 3Q 2015” report found that the use of Tor for malicious purposes has increased. Roughly 180,000 malicious events originated from U.S. exit nodes between Jan. 1, 2015, and May 10, 2015. Malicious events also came from exit nodes in the Netherlands (150,000), Romania (80,000), France (60,000), Luxembourg (55,000) and Uruguay (53,000).

While Tor can be used for good, it can also be misused to facilitate cybercriminals. Finding the balance between allowing Internet freedom and preventing crime will be a tough challenge for the project.

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today