

Onion routing is implemented by means of encryption in the application layer of the communication protocol stack, nested like the layers of an onion. Reed and David Goldschlag, to protect American intelligence communications online. The core principle of Tor, onion routing, was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. 4.9 Relay early traffic confirmation attack.4.6 Some protocols exposing IP addresses.4.2.1 Autonomous system (AS) eavesdropping.Comparison of Internet Relay Chat clients.

Overlay network, mix network, onion router, Anonymity application Unix-like, ( Android, Linux, BSD, macOS), Microsoft Windows, iOS
