Name : Roger Dingledine

          Institution : The Tor Project



 Roger Dingledine is project leader for The Tor Project, a US non-profit working on anonymity research and development for such diverse organizations as the US Navy, the Electronic Frontier Foundation, and Voice of America. In addition to all the hats he wears for Tor, Rogerorganizes academic conferences on anonymity, speaks at such events as Blackhat, Defcon, Toorcon, CCC congresses, and What the Hack, and also does tutorials on anonymity for national and foreign law enforcement. Roger was honored in 2006 as one of the top 35 innovators under the age of 35 by Technology Review magazine.



Publications :


Roger Dingledine, Nick Mathewson, Paul Syverson. "Tor: The Second-Generation Onion Router." Usenix Security 2004, August 2004.


Roger Dingledine, Nick Mathewson. "Anonymity Loves Company: Usability and

the Network Effect." Workshop on the Economics of Information Security,

June 2006.




Title of Project: Anonymous Communications for the DoD, Iran, and you.


What do the Department of Defense and the Electronic Frontier Foundation have in common? They have both funded the development of Tor (, a free-software anonymizing network that helps people around the world use the Internet in safety. Tor's 1500 volunteer servers carry traffic for several hundred thousand users including ordinary citizens who want protection from identity theft and prying corporations, corporations who want to look at a competitor's website in private, and soldiers and aid workers in the Middle East who need to contact their home servers without fear of physical harm.


I'll give an overview of the Tor architecture, and talk about the variety of people who use it and what security it provides. Then we’ll focus on the use of tools like Tor in countries like Iran and China: why anonymity is important for circumvention, why transparency in design and operation is critical for trust, the role of popular media in helping -- and harming -- the effectiveness of the tools, and tradeoffs between usability and security.