
Many Tor users rely on the network to be able to speak freely and engage in activism while living under a repressive regime, where they may be persecuted for these activities. However, none of the Tor relays, destination hosts, or eavesdroppers on a single network can easily identify both source and destination address. The source address is known to first Tor relay along the path (and to eavesdroppers on networks between the source and the first Tor relay), and the destination address is known to the last Tor relay along the path (and to eavesdroppers on networks between the last Tor relay and the destination). When using Tor, network traffic is encrypted with multiple layers of encryption and routed through a sequence of Tor relays, which facilitates an anonymous connection between the source user and destination host. Tor is an anonymity network, used by people around the world to browse the Internet anonymously. For more details, please refer to the CloudLab user manual. To reproduce this experiment, you will need an account on CloudLab, and you should have some basic familiarity with the platform. This experiment will take approximately 30 minutes to setup, and another 30 minutes to test the network. Then, we'll retrieve several different websites with and without Tor, to better understand how the Tor latency affects the user experience, especially with respect to page load time. In this experiment, we will set up a private Tor network, with complete control over network conditions at each Tor node.

However, routing web traffic through the Tor network also adds extra latency to each packet. Tor is an anonymity network that is used by privacy-conscious users around the world to browse the web anonymously.

Menu Experimental evaluation of the impact of Tor latency on web browsing Bintia Keitaġ2 January 2021 on low latency, tor, security
