January 26, 2016 By Larry Loeb 2 min read

On Jan. 20, 2016, the Tor Project announced the results of its crowdfunding project.

Over $205,000 was raised from more than 5,200 donors. Contributions were made from personalities such as Laura Poitras, the Citizen Four director; Shari Steele, former EFF executive director; Alison Macrina, the founder and director of the Library Freedom Project; and Tor Project co-founder Roger Dingledine.

The crowdfunding campaign was an attempt to find alternate sources of funding than government and university grants.

Tor Project Gets Funding

As the project put it on its website, “Crowdfunding gives us flexibility to do what we think is most important, when we want to do it. It allows us to fund the development of powerful new privacy tools. Or make the ones we have stronger and more resilient. Or pay for things we need like a funded help desk or an Arabic version of our website.”

SecurityWeek noted that the Tor Project plans to launch a bug bounty program via the HackerOne platform this year. It has also announced ways to improve Tor browser security through a multiprocess sandbox, application-level sandboxing and Mac OS signing. Undoubtedly the new funding will help these efforts.

Problems in Fundraising

But the donation process did not go smoothly in all cases. One user who tried to donate anonymously complained loudly on Tor’s blog. “Any Tor user knows that in the last month, Tor has become unusable on 99 percent of CloudFlare secured websites,” the user wrote. “Users are presented with an impossible CAPTCHA, or even when they are presented with a solvable one, it is interpreted as incorrect. When an audio challenge is given, one number is deliberately unintelligible, or in the event of a solvable audio CAPTCHA, you are still taken to another CAPTCHA.”

Others also expressed their frustration at the difficulty of the donation process, as well as problems Tor has integrating with CloudFlare. That’s because CloudFlare has had a longstanding anti-anonymity policy, and the Tor project has been trying to deal with it — unsuccessfully — for a long time.

Privacy Can Be Misused

It’s not all peaches and cream with Tor — the service has a dark side. In fact, the “IBM X-Force Threat Intelligence Quarterly – 3Q 2015” report found that the use of Tor for malicious purposes has increased. Roughly 180,000 malicious events originated from U.S. exit nodes between Jan. 1, 2015, and May 10, 2015. Malicious events also came from exit nodes in the Netherlands (150,000), Romania (80,000), France (60,000), Luxembourg (55,000) and Uruguay (53,000).

While Tor can be used for good, it can also be misused to facilitate cybercriminals. Finding the balance between allowing Internet freedom and preventing crime will be a tough challenge for the project.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today