

Software developers use the network to create new communication tools with built-in privacy features other organizations use the serve to conduct confidential business, both legal and illicit.Īnalysts have linked the attacks to the shutdown of Freedom Hosting, a purveyor of secret services for sharing child pornography. Tor directs Internet traffic through a worldwide volunteer network of 3,000-plus relays to conceal user location or usage.

Tor is a network of virtual tunnels through which users can share information anonymously. Various reports have linked the attack to Federal agencies, possibly as part of a crackdown on Freedom Hosting for alleged distribution of child pornography.

Users running the Firefox-based Tor Browser Bundle for Windows are being targeted by an attack that lets the perpetrator snag victims' host names and MAC addresses or even take over their systems, according to the official Tor Project blog.
