Tor glossary version 1.0
A
add-on, extension, or plugin
antivirus software
App
Atlas
B
bandwidth authority
bridge
bridge authority
browser fingerprinting
browsing history
C
CAPTCHA
checksum
circuit
client
Compass
consensus
cookie
cross-site scripting (XSS)
Cross-Site Scripting (XSS) allows an attacker to add malicious functionality or behavior to a website when they shouldn't have the ability to do so.
cryptographic signature
#publickeycryptographyhttps://www.torproject.org/docs/verifying-signatures.html.en.
D
Daemon
A daemon is a computer program that runs as a background process, rather than being under the direct control of a user.
directory authority
E
encryption
end-to-end encrypted
exit
ExoneraTor
F
Firefox
firewall
Flash Player
fte
G
GetTor
GSoC
The Tor Project participates in the Google Summer of Code, which is a summer program for university students.
guard
H
hash
A cryptographic hash value is the result of a mathematical algorithm that maps data to a bit string of a fixed size. It's designed as one-way-function which means the value is easy to calculate in one direction but infeasible to invert. Hash values serve to verify the integrity of data.
hidden services
hop
HTTP
The Hypertext Transfer Protocol (HTTP) is a channel used to send files and data between devices on a network. Originally used to transfer only web pages, it is now relied upon to deliver many forms of data and communication.
HTTPS
HTTPS-Everywhere
I
Internet Service Provider (ISP)
IP address
J
JavaScript
K
L
little-t tor
"little-t tor" is one way of referring to tor the network daemon, as opposed to Tor Browser or Tor Project.
M
meek
middle relay
N
New Identity
New Tor Circuit for this Site
network censorship
NoScript
nyx
O
obfs3
obfs4
onion address
OONI
onion services
Onionoo
onionsite
onionspace
Operating System (OS)
The main system software that manages computer hardware and software resources and provides common services for computer programs. The most used desktop operating systems are Windows, OS X and Linux. Android and iOS are the dominant mobile operating systems.
Orbot
Orfox
P
pluggable transports
private key
proxy
public key
public key cryptography
Q
R
relay
S
Satori
scramblesuit
script
Elements used for offering dynamic/interactive content via websites.
Security Slider
self-authenticating address
server
A device on a network which offers a service, such as file and web page storage, email or chat.
session
single onion service
Stem
Sybil attack
The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating a large number of identities, and using them to gain a disproportionately large influence in the network.
T
Tails
The Tor Project
The Tor Project can refer to either The Tor Project Inc, a 501(c)3 US nonprofit responsible for maintaining the Tor software, or the Tor Project community made up of thousands of volunteers from all over the world who help create Tor.
third-party tracking
Tor / Tor network/ Core Tor
Tor Browser
Tor Launcher
Tor log
Tor Messenger
TorBirdy
Torbutton
torrc
Torsocks
Tor2Web
TPI
TPI is an acronym for The Tor Project, Inc.
tpo
People on IRC often use tpo
to abbreviate torproject.org
when writing hostnames. For example, trac.tpo
is an abbreviation for trac.torproject.org
.
traffic
U
V
W
Web Browser
website mirror
A website mirror is an one-to-one copy of a website which you can find under other web addresses. A current list of torproject.org mirrors is available at https://www.torproject.org/getinvolved/mirrors.html.en.
X
Y
Z
<center>
<a rel="license" href="http://creativecommons.org/licenses/by-sa/4.0/"><img alt="Creative Commons License" style="border-width:0" src="https://i.creativecommons.org/l/by-sa/4.0/88x31.png" /></a><br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/4.0/">Creative Commons Attribution-ShareAlike 4.0 International License</a>.
</center>