Overview

A. Overview
 * A brief analysis of how the chosen technology works, its stage of commercialization/technical development, standards (or competing standards) [[image:https://lh3.googleusercontent.com/w-J26A4YJoTLUqB0ixa23d-fSKEnLs4BaBtRvuQyp-bBACWc7xULZSgP43JhuqpQetem31VA7If2y_NkzGdA0KZZ19Bacsny6WW3nc-b0dZe6VDy1w4]]

To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through. Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support. For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.
 * A brief discussion of it interoperates with the Internet and/or other types of networks
 * secure browsing on the internet
 * secure browsing on the darknet
 * info on darknet
 * Key domains of envisioned applications (a minimal set of non-overlapping domains should be developed)
 * Web Browsing(The anonymity network [|__Tor__]  has a top-level pseudo-domain [|__onion__] <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">, which can only be reached with a Tor client because it uses the Tor-protocol ( <span style="background-color: transparent; color: #000099; font-family: Arial; font-size: 15px; vertical-align: baseline;">[|__onion routing__] <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">) to reach the hidden service to protect the anonymity of users.)(http://en.wikipedia.org/wiki/Top-level_domain)
 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">File Sharing
 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">Instant Messaging
 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">Key technical challenges that are currently faced by this technology (think of our Teledesic discussion to guide your thinking). Also consider network security and privacy issues here, if relevant.
 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">The ability for someone non-technical to install and operate TOR
 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">must know how to block certain IP’s and Ports so certain traffice cannot go through your node
 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;"><span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">One of Tor’s critical performance problems is in how it combines high-volume streams with low-volume streams. We need to come up with ways to let the “quiet” streams (like web browsing) co-exist better with the “loud” streams (like bulk transfer). <span style="background-color: transparent; color: #000099; font-family: Arial; font-size: 15px; vertical-align: baseline;">__(https://docs.google.com/viewer?a=v&q=cache:Fq0dQO2Ttj4J:www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-roger_dingledine-tor.pdf+&hl=en&gl=us&pid=bl&srcid=ADGEEShYwm5lC74AvuFfAgMsCdE96QI1yZuVFJfz2y_3ZwG3yXyKmtJHMbEf2DDIUfIfkY-c5sVP43axA93n2PL1KsH1QbZTX_I3DqMoteQ_FSpUAU2vuMfslkksH_hhIxL_q5cjM9_Y&sig=AHIEtbQ9XX4urzD0C-HGIsHjYZZA1Kdp2w)__
 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">bitTorrent is the majority of the load on the TOR network which slows it tremendously.
 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">Data can be observed where the computer connects to the network, and exits the network if someone is sniffing the packets on the local network, which is one security flaw.


 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">Key business challenges that are currently faced by this technology. Is this technology creating an entirely new market or disrupting an existing market? Directly consider what/who this might be competing against (e.g., Skype disrupts ATT’s markets but iTunes creates a relatively untapped/new market). What management problems do you expect
 * <span style="background-color: transparent; color: #000000; font-family: Arial; font-size: 15px; text-decoration: none; vertical-align: baseline;">Kevins Link on VPN and IP2