

They’ll always say yes to taking your money. We need more Tor servers in Africa and Asia where users at risk may be located.Ī commercial provider is happy to sell you a contract to host a Tor server.

It may be that users are unfamiliar with Tor, but it seems more likely that we simply need more infrastructure to speed up the network to make it more usable. There are a tiny number of Tor users in Africa, but there is certainly a lot of need. However, Tor seems to be too slow in places like Namibia. We believe that Tor is good for those users and it appears to work well, in part because the vast majority of the Tor infrastructure is located in the United States and Europe. If you look at a map of where Tor users are, you’ll notice there are a lot in the United States and in Europe.

Here is what we have learned running Tor exit nodes. Access Now provides support for 20 Tor exit nodes, but does not also run bridges. If one group controls both bridges and exit nodes, it would be possible to de-anonymize that traffic. Internet traffic enters the network through known entrances called “bridges” it is rerouted through various relays and exits on a known exit point. Tor is a network to relay and attempt to anonymize internet traffic. We also provide capacity for the Tor network. Many of you know about our 24-7, 365 helpline for civil society.

We are dedicated to defending and extending the rights of users at risk around the world. Part of this network of technologists eventually coalesced into Access Now. As millions challenged the election results, this network of technologists provided critical support that helped this burgeoning democracy movement participate in global dialogue. In 2009, following the Iranian post-election crackdown, a group of technologists began a series of interventions to keep Facebook, YouTube, Twitter, independent blogs, and email clients accessible and unmonitored. You can see the presentation in its entirety in the video below.Īccess Now is first and foremost a technology group. The following post is adapted from a presentation at Chaos Communication Camp 2015.
