The Project's early work focused on an anonymous storage system, Free Haven, which was designed to ensure the privacy and security of both readers and publishers.[4][5] It contrasts Free Haven to anonymous publishing services to emphasize persistence rather than accessibility. Free Haven is a distributed peer-to-peer system designed to create a "servnet" consisting of "servnet nodes" which each hold fragments ("shares") of documents, divided using Rabin's Information dispersal
algorithm such that the publisher or file contents cannot be determined by any one piece.[6][7][8] The shares are stored on the servnet along with a unique public key. To recover and recreate the file, a client broadcasts the public key to find fragments, which are sent to the client along anonymous routes. For greater security, Free Haven periodically moves the location of shares between nodes.[9][10]
Its function is similar to Freenet but with greater focus on persistence to ensure unpopular files do not disappear.[11] The mechanisms that enable this persistence, however, are also the cause of some problems with inefficiency.[12] A referral- or recommendation-based "metatrust" reputation system built into the servnet attempts to ensure reciprocity and information value by holding node operators accountable.[13][14] Although nodes remain pseudonymous, communication is facilitated between operators through anonymous email.[15]
Tor was developed by the US Naval Research Laboratory and the Free Haven Project to secure government communications, with initial funding from the US Office of Naval Research and DARPA. Tor was deployed in 2003, as their third generation of deployed onion routing designs.[2] In 2005, the Electronic Frontier Foundation provided additional funding to the Free Haven Project.[2] In 2006, the Tor Project was incorporated as a non-profit organization.[2]
References
^"Free Haven". Freehaven.net. Free Haven Project. Archived from the original on 19 June 2014. Retrieved 4 June 2014.
^Hansen, J. A. (March 2010). "Adding privacy and currency to social networking". 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). Mannheim. pp. 607–612. doi:10.1109/PERCOMW.2010.5470508.
^Hermoni, O.; Gilboa, N.; Felstaine, E.; Shitrit, S. (January 2008). "Deniability — an alibi for users in P2P networks"(PDF). 3rd International Conference on Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. Communication Systems Software and Middleware and Workshops. pp. 310–317. doi:10.1109/COMSWA.2008.4554432. Archived(PDF) from the original on 6 June 2014. Retrieved 3 June 2014.
^Dingledine, R.; Freedman, M. J. & Molnar, D. (2001). "The Free Haven Project: Distributed Anonymous Storage Service"(PDF). Lecture Notes in Computer Science 2009. Proc. Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag. Archived(PDF) from the original on 23 September 2015. Retrieved 2 June 2014.
^Chothia, T.; Chatzikokolakis, K. (2005). "A Survey of Anonymous Peer-to-Peer File-Sharing"(PDF). Lecture Notes in Computer Science. Embedded and Ubiquitous Computing – EUC 2005 Workshops. Springer Berlin Heidelberg. pp. 744–755. doi:10.1007/11596042_77. Archived(PDF) from the original on 13 August 2021. Retrieved 3 June 2014.
^Viljanen, L. (August 2005). "Towards an Ontology of Trust"(PDF). Trust, Privacy, and Security in Digital Business. Second International Conference, TrustBus 2005. Copenhagen, Denmark: Springer Berlin Heidelberg. pp. 175–184. doi:10.1007/11537878_18. Archived(PDF) from the original on 7 June 2014. Retrieved 3 June 2014.
^Oppliger, R. (October 2005). "Privacy-enhancing technologies for the world wide web". Computer Communications. 28 (16): 1791–1797. doi:10.1016/j.comcom.2005.02.003.