WikiLeaks, the swashbuckling new-media organization whose motto is “We open governments,” relies on a technology of extreme reticence called Tor Hidden Services — a part of the Tor Project, a nonprofit organization dedicated not to light and clarity but to shadows and opacity, to the increasingly difficult art of keeping secrets online.
Transparent: The Freedom of Secrecy (read: "Deep Throat")
As of this writing, WikiLeaks — which has been denied services by Amazon, Visa, MasterCard and PayPal — is available at wikileaks.ch. You can read leaked documents and reports, contribute to the organization and, if you’ve got documents, avail yourself of the Tor-secured electronic drop box. That could change anytime.
A deliberately byzantine system of virtual tunnels that conceal the origins and destinations of data, and thus the identity of clients, Tor has been around since 2001, when programmers from M.I.T. and the U.S. Naval Research Laboratory introduced it at a California security conference. In the past year, supported by grants from the U.S. government and other funders, the Tor Project has prolifically expanded its networks. The software has been downloaded more than 36 million times this year, and thousands of nameless volunteers — many of them Tor clients — now help to relay mind-bogglingly diverse Tor data in nearly every country on earth.
Peaceniks and human rights groups use Tor, as do journalists, private citizens and the military, and the heterogeneity and farflungness of its users — together with its elegant source code — keep it unbreachable. When a communication arrives from Tor, you can never know where or whom it’s from. Tor is by design not a media project or a human rights one or (anymore) a military one.
Jacob Appelbaum, a developer for Tor who travels the world explaining Tor to human rights and social-justice activists, says that users periodically complain about the politics and motivations of other (self-identified) users. What they don’t grasp is that if Tor were cohesive — physically or ideologically — its members could be identified. As Appelbaum explained, “If it’s only the military using the Tor network” — say — “it’s not anonymous.”
A Tor transmission these days might start in Addis Ababa, hop to Dallas, then to Stockholm and finally Johannesburg. (There are some 2,000 Tor relay nodes at any one time across the globe.) The only thing the Johannesburg recipient can discover is that the data came from Tor, and Tor has successfully identified itself with no person or group, only with ideological incoherence. For the person trying to get a message out through Tor, this means he communicates exactly as much as he chooses and no more. With Tor, you “only reveal the information that you type,” Appelbaum says. “As opposed to all the other information that comes along when you use your computer.”
The Tor Project is now building a Linux-based system, distributed on CD, to make Internet connections entirely anonymous by providing a portable, secure operating system that can be temporarily grafted onto another computer (even in a cafe). Soon users will also be able to take a router provided by Tor and plug it into their home networks.
“It’s so ironic that I’d be such a public WikiLeaks supporter,” Appelbaum told me. “Because I work for anonymity. I believe quite clearly that people have a right to personal privacy. I wear pants because it’s no one else’s business what I look like under my pants. The same way I want curtains on my windows, I want curtains on my e-mail.”
Source: Sunday Magazine, New York Times, December 19, 2010