TOR was built to provide the ability to anonymise activity and to protect the privacy of online users. Like many technologies that can be used for good and evil, TOR is no exception.
By providing a dynamic encrypted IP network, a covert hosting environment and the ability to obfuscate the IP addresses of users when accessing the Internet, users of TOR can access this diverse network capability through the use of modified browser’s, scripting and client side software.
Presentation TOR Introduction
Please contact the friendly CyberOps team to discuss how we can help.