Skip to main content

Tor creating "deep web" instant messaging service

With privacy concerns plaguing the future of instant messaging service WhatsApp (opens in new tab) following its $19 billion acquisition by Facebook (opens in new tab), at least there's some good news to be had in the world of secure messaging.

Tor, the team behind the world's leading online anonymity service, known colloquially as the "dark net" or "deep web", has announced that it will develop a new anonymous instant messenger client, according to documents produced at the Tor 2014 Winter Developers Meeting in Reykjavík, Iceland.

The Tor Instant Messaging Bundle (TIMB) will do to instant messaging what the Tor network did for Internet browsing – that is, completely anonymise it, by routing it through a vast and unpredictable network of relays.

However, concerns are already being raised that the messaging service will be used primarily by those seeking to engage in criminal activity (opens in new tab), such as child pornography, drugs or terrorism.

Tor has claimed that its new chat network will allow "people in countries where communication for the purpose of activism is met with intimidation, violence, and prosecution" to "avoid the scrutiny of criminal cartels, corrupt officials, and authoritarian governments."

Software such as TorChat and BitMessage already have significant userbases and smart advocates, but with the full weight of the Tor Launcher and team behind it, TIMB could be something else entirely.

Tor works by piling up layers of encryption over data, nested like the layers of an onion, which gave the network its original name, The Onion Router (TOR).

Tor encrypts data, including the destination IP address, multiple times and sends it through a virtual circuit made up of successive, randomly selected relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit.

The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address.

Even the NSA has had considerable trouble cracking the Tor network, despite repeated attempts (opens in new tab).

Paul has worked as an archivist, editor and journalist, and has a PhD in the cultural and literary significance of ruins. His writing has appeared in the New York Times, The BBC, The Atlantic, National Geographic, and Discover Magazine, and he was previously Staff Writer and Journalist at ITProPortal.