

What are some of Tor's plans for mitigating attacks? The CMU attack was fundamentally a "guard node" attack guard nodes are the first hop of a Tor circuit and hence the only part of the network that can see the real IP address of a hidden service. There is a lot of enthusiasm within Tor for hidden services but we need funding and more high level developers to build the next generation. Now we have a very small group of developers, but in 2016 we want to move the engineering capacity a bit farther out. What don't people know about onion Services? Until earlier this year, hidden services were a labor of love that Tor developers did in their spare time. The whole thing is a pretty insane engineering job. We’ve broken the development down into smaller modules and we’re already starting to build the foundation. What are your priorities for onion services development? Personally I think it’s very important to work on the security of hidden services that’s a big priority. The plan for the next generation of onion services includes enhanced security as well as improved performance. Tor developers use the terms "hidden services" and "onion services" interchangeably. The secure messaging app ricochet is an example of a hidden service. A hidden service is a site you visit or a service you use that uses Tor technology to stay secure and, if the owner wishes, anonymous. Tor Browser (downloadable at ) allows you to browse, or surf, the web, anonymously.

Please note that Tor Browser and hidden services are two different things. This is an interview with a Tor developer who works on hidden services.
