


Two students from the Massachusetts Institute of Technology (MIT) took the onion ring framework and put it to use on what will then become the most popular implementation of onion routing.

It wasn’t until the mid-2000s when onion routing found its wings. The internet was still in its infancy, but the idea that people will need private access to the internet was a concern even back then. Onion routing was conceptualized and built back in the 1990s at the U.S Naval Research Lab by three researchers who wanted to achieve anonymity. The basis for that name will become clear in a while. This blog aims to educate you on why exactly TOR is gaining popularity. Today, TOR is used outside of research by users who are demanding privacy more than ever.īut the function of TOR and how it is used is still a mystery to many. It was built as a tool that encrypts data and makes the user anonymous by using multiple relays to reach the destination. TOR is an anonymous network for accessing the internet.
