{"id":210432,"date":"2017-08-08T03:51:01","date_gmt":"2017-08-08T07:51:01","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/major-improvements-are-coming-soon-to-the-tor-browser-the-merkle\/"},"modified":"2017-08-08T03:51:01","modified_gmt":"2017-08-08T07:51:01","slug":"major-improvements-are-coming-soon-to-the-tor-browser-the-merkle","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/major-improvements-are-coming-soon-to-the-tor-browser-the-merkle\/","title":{"rendered":"Major Improvements Are Coming Soon to the Tor Browser &#8211; The Merkle"},"content":{"rendered":"<p><p>    The Tor software is a common tool among consumers who prefer    to enjoymore privacy while accessing the internet on a    regular basis. However, we also know the Tor software is not    without its flaws. The developer of this browser    hasacknowledged that furtherimprovements need to be    made. A batch of new features wasannounced earlier this    week. All of these improvements should make Tor a much safer    tool.  <\/p>\n<p>    There are a lot of misconceptions about the Tor    software and the people who use it. Someautomatically    assume that anyone using Tor must be frequenting the darknet.    However, the vast majority of people utilizingTor do so    to access regular websites. Thebrowser provides more    privacy and anonymity features than any other browsing software    in the world today. It is no surprise that a lot of people    would prefer this software for regular internet usage.  <\/p>\n<p>    Tors developer has clarified another myth surrounding    the usage of this software. The NSA does not run half the    relays used by the network by any means. With over 8,000 relays    on a global scale, that would require a ton of resources to    pull off. Some intelligence agencies doset up temporary    relays every now and then. The vast majority, however, are run    by independent users with no political agenda    whatsoever.  <\/p>\n<p>    The biggest announcement concernedsome new features    coming to a Tor browser near you. The team has partnered    with Privacy    Enhancing Technologies Symposium to improve    traffic analysis resistance. This method is often used to    identify Tor users with relative ease. Stepping up    countermeasure efforts should result in making it a lot more    difficult to de-anonymize onion services in the    future.  <\/p>\n<p>    The Tor protocol will switch to a new cryptosystem using    elliptic curve cryptography keys such as Ed25519. At present,    the protocol continues torely on the first 80 bits of the    SHA-1 of a 1024-bit RSA key. Althoughthis has worked    quite well so far, the system hasgotten a bit outdated.    Especially consideringthe progress made in quantum    computing, the time is now to come up with improved solutions    which guarantee additional privacy for all users. One always    has to prepare for whatever the future may hold.  <\/p>\n<p>    Further changes include making it more difficult to set    up     relays to target particular onion    services. This will be done through an improved hidden service    directory design functioning similarly toDNS for the    regular internet. The current use of HSDir relays is too    predictable in the mindsof the developers. Tackling this    problem will not be an easy feat, but it should be feasible to    improve upon this feature in the coming months and    years.  <\/p>\n<p>    Perhaps the most intriguing new features come in the form    of different deployment models. Tor users can now sacrifice    location privacy for performance and scalability if they wish    to do so. This method hasbeen used by services such as    Facebook already to improve load times and so forth, and it    makes sense to integrate different deployment models. Making    Tor the new standard among Internet browsers will not be easy,    but all of these steps pave the way toward achieving that    goal.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/themerkle.com\/major-improvements-are-coming-to-the-tor-browser-in-the-near-future\/\" title=\"Major Improvements Are Coming Soon to the Tor Browser - The Merkle\">Major Improvements Are Coming Soon to the Tor Browser - The Merkle<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Tor software is a common tool among consumers who prefer to enjoymore privacy while accessing the internet on a regular basis. However, we also know the Tor software is not without its flaws.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/major-improvements-are-coming-soon-to-the-tor-browser-the-merkle\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-210432","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/210432"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=210432"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/210432\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=210432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=210432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=210432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}