00:00All right, let's talk about one of the most paradoxical tools of the digital age, TOR.
00:05You've probably heard of it.
00:06It's this incredibly powerful piece of technology that's used by government spies
00:10and at the same time by the activists who are trying to avoid them.
00:13It's a real puzzle and one of the most controversial topics online today.
00:18So which is it?
00:19Is TOR a heroic shield for whistleblowers and people fighting for their rights?
00:24Or is it a villain's playground, a lawless space for the worst parts of the internet?
00:28Well, the truth is, it's kind of both.
00:32And that's what makes this so complicated.
00:35And here's where the story gets really wild.
00:37This whole thing was originally built by the U.S. Navy.
00:41Yep, the U.S. government.
00:43But today, it's the number one tool for everyone from spies and activists to, you guessed it, criminals.
00:50How on earth did we get here?
00:52To really get to the bottom of this dilemma, you first have to understand how the tech actually works.
00:57And its origin story, well, let's just say it's not what you'd expect.
01:01Yeah, forget the stereotype of some hacker in a dark basement.
01:05TOR was born in a U.S. naval research lab.
01:08The goal was simple.
01:09U.S. intelligence needed a way to talk online without anyone tracing them.
01:13But they had a huge problem.
01:14If the only people using this secret network were spies, then any message from it would basically scream,
01:20hi, I'm a U.S. spy.
01:21Their solution was kind of brilliant.
01:23They opened it up to the public.
01:24The idea was to create a massive digital crowd, a sea of regular people, so their agents could just blend
01:30in and disappear.
01:31And that's where the name comes from.
01:34TOR actually stands for the Onion Router.
01:36And that metaphor is perfect.
01:38Just imagine your data is the tiny core of an onion.
01:41Before it goes anywhere, TOR wraps it in multiple, separate layers of encryption.
01:46So here's how that works in practice.
01:48When you use TOR, your internet traffic gets bounced between three random computers out there in the world.
01:53The first stop, the entry node, knows that you sent something.
01:57But because of that first layer of encryption, it has no idea where it's ultimately going.
02:01Then you hit the middle node.
02:02This one is completely in the dark.
02:04It doesn't know who sent the data or its final destination.
02:07It just passes it along.
02:08Finally, your data gets to the exit node.
02:10This last stop can see where you're going, say a news website, but it has absolutely no idea who you
02:15are.
02:16At each step, just one layer of the onion is peeled back.
02:19It's a simple but genius way to make sure no single point in the chain knows both who you are
02:23and where you're going.
02:25Okay, so that powerful anonymity isn't just a cool tech feature.
02:29It's become an absolutely essential shield for some of the most vulnerable people on the planet.
02:34Let's dig into the powerful argument for why TOR has to exist.
02:38For millions of people, this isn't just about privacy.
02:42It's a literal lifeline.
02:44Whistleblowers use platforms like SecureDrop, which is built on TOR, to get sensitive documents to journalists without getting caught.
02:50Activists, you know, going all the way back to the Arab Spring, have used it to organize and get around
02:55government censorship.
02:56And on a really personal level, it allows survivors of domestic violence to look for help online without their abusers
03:02being able to track their every click.
03:04But, and this is the big but, that exact same shield has a massive, unavoidable flip side.
03:11The very same features that protect a journalist in a war zone can also protect a criminal mastermind.
03:18This is the dark side of the onion.
03:20Let's be real, this level of anonymity is what powers the dark web.
03:24There's a special feature in TOR called Hidden Services that makes it possible to host a website without anyone being
03:31able to find the server's physical location.
03:33That's what gave us infamous illegal marketplaces like the Silk Road.
03:37And today, ransomware gangs use that exact same feature to host their websites, to leak stolen data, and to demand
03:44payments, which makes them incredibly hard for police to find and shut down.
03:49And all of this brings us right to the core of the problem.
03:53It's a moral question and a technical one.
03:55Is it even possible to have the good without the bad?
03:58Can you have a tool that offers this kind of protection without also enabling all this peril?
04:03You know, for law enforcement, it's a complete catch-22.
04:07Let's say they figure out a way to break TOR's anonymity so they can catch some drug traffickers.
04:12Well, that same exact technique could then be used by an authoritarian government to unmask a human rights activist.
04:17If you break it for one, you break it for everyone.
04:21Including, by the way, their own spies who are trying to hide in that same crowd.
04:25There's a term for this kind of thing.
04:26It's called a dual-use technology.
04:29And here's the final incredible twist of irony.
04:33The U.S. government is still one of the biggest funders of the non-profit that runs the TOR project.
04:38So the very same government trying to undermine it to catch criminals is also paying to keep the lights on.
04:44Because they know they need it too.
04:46When you get right down to it, TOR itself isn't good or evil.
04:49It's a neutral tool.
04:51I love this quote because it puts it so simply.
04:53It's like a hammer.
04:54A hammer has no agenda.
04:56You can use it to build a home for someone in need.
04:58Or you can use it to smash a window.
05:00It's all about who's holding it.
05:01And that leaves us right here with this one big provocative idea.
05:05It's the fundamental trade-off of our digital lives.
05:08The real price of having true, meaningful privacy might be that we have to tolerate the fact that some people
05:14will use that freedom for terrible things.
05:17So the real question we have to ask ourselves is, is that a price we're willing to pay?
05:21The real pleasure of having true exhibitions in people in this world should look like this.
05:21You can get one last time, follow the first day.
05:21And I get all the people who also want to think about.
05:21I don't want to sell you different.
05:22I don't want to tell you what they want to say.
Comments