Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Tor Project Releases Financial Documents

The Tor Project, the organization behind the Tor anonymity network, has published financial documents for the past two years, and while they show that its revenue has increased significantly, it’s still small compared to the budgets of potential adversaries.

The Tor Project, the organization behind the Tor anonymity network, has published financial documents for the past two years, and while they show that its revenue has increased significantly, it’s still small compared to the budgets of potential adversaries.

According to the Tor Project, its revenue in 2015 and 2016 was roughly $3.2 million, but increased to over $4.1 million in 2017.

Tor started off as a US government project and most of its funding has come from there for many years. In 2015, for instance, 85% of the Tor Project’s funding came from US government sources. However, in 2016 that percentage dropped to 76% and last year it went further down to 51%.Tor Project releases financial documents

Financial documents for 2017 show that nearly $600,000 came from the Swedish International Development Cooperation Agency, which is the only non-US government organization that contributed to the project. The non-government sources of revenue include Mozilla ($522,000), DuckDuckGo ($25,000), New Venture Fund ($347,000), and individual donations ($425,000).

“Tor’s budget, even at the 2017 level, remains modest considering the number of people involved and the impact we have. And it is dwarfed by the budgets that our adversaries are spending to make the world a more dangerous and less free place,” explained Roger Dingledine, one of the founders of the Tor Project and an early developer of Tor.

It’s worth noting that, back in 2015, the US government was said to have paid Carnegie Mellon University at least $1 million to find a way to deanonymize Tor users suspected of conducting criminal activities.

The Tor Project reported having 21 employees and 3,000 volunteers in 2017. The number of volunteers was roughly the same as in the previous year, but the number of employees increased from 16.

Dingledine also sought to alleviate concerns that governments may be paying for “something bad.”

“The way it works is that we try to find groups with funding for the general area that we want to work on, and then we go to them with a specific plan for what we’d like to do and how much it will cost, and if we’re lucky they say ok. There is never any point where somebody comes to us and says ‘I’ll pay you $X to do Y’,” he explained.

Advertisement. Scroll to continue reading.

Related: Tor Offers $4,000 Per Flaw in Public Bug Bounty Program

Related: Cloudflare Launches Security Service for Tor Users

Related: Zerodium Discloses Flaw That Allows Code Execution in Tor Browser

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...