

(We do not collect this data because we believe that a privacy network should put privacy foremost, and that the best way to protect people's information is not to collect it in the first place.) This is fantastic when it comes to protecting users against advertisers, censors, miscellaneous snoops, and the secret police of authoritarian regimes. Similarly, because we don't gather sensitive data on our network, we cannot (as some networks do) publish regular reports on what kinds of uses we are seeing. After all, it would hardly be in keeping with our pro-privacy beliefs to publish tech-support requests!

We are approached by people who need Tor to stay safe at work, whether they are going after criminals on behalf of their governments, or going after the criminals who run their governments, or just regular people trying to preserve their privacy.īut naturally, most of these stories are ones that we don't have permission to share. We regularly hear from vulnerable populations and people who need to cope with surveillance. We can speak in the abstract about the importance of free speech and privacy on the internet, but no abstract statement is quite so persuasive as a real-world example. And of course, the code is all open-source.īut explaining why Tor is important is more of a challenge. We have plenty of practice explaining how Tor works, from technical specifications, design documents, academic papers, and popular presentation. What do you use Tor for? Why do you need it? What has Tor done for you? We need your stories.
