

Tor is a software that allows users to browse the Web anonymously. This article highlights some major risks of using Tor in a business network, and provides some recommendations to prevent and/or detect it. On the other hand, it becomes very important for organizations to understand the risks associated with the use of this software in their business network. In a short amount of time, usage of this tool became increasingly widespread amongst business networks and it is now considered one of the largest and most famous anonymity networks available. Therefore, many tools providing anonymity emerged and were made available for the general public. This alone defeats the sole purpose of anonymity on the Internet.

Thus, it is possible to identify who is initiating the communication, and for whom this communication is intended. The main reason for this is the fact that in this case only the communication is encrypted it is still possible to know the source and destination of the communication. In these applications, encryption alone cannot maintain the anonymity required by users. However, anonymity has become a necessary and legitimate aim in many applications (browsing the internet, chatting, sending instant messages etc.). The Internet was not designed with anonymity in mind in fact, one of the original design goals was accountability. Is it Safe to Use a Tor Network in Your Business?
