Commit 5ae2fde9 authored by Iain R. Learmonth's avatar Iain R. Learmonth
Browse files

Creates a research tools page

Fixes: #29560
parent 8f8e77ec
...@@ -22,11 +22,17 @@ theme = "torproject" ...@@ -22,11 +22,17 @@ theme = "torproject"
weight = -180 weight = -180
[[menu.main]] [[menu.main]]
name = "Research Ideas" name = "Ideas"
title = "Research Ideas with Tor" title = "Tor Research Ideas"
url = "/ideas" url = "/ideas"
weight = -170 weight = -170
name = "Tools"
title = "Tor Research Tools"
url = "/tools"
weight = -165
[[menu.main]] [[menu.main]]
name = "Tech Reports" name = "Tech Reports"
title = "Tor Project Technical Reports" title = "Tor Project Technical Reports"
title: Research Tools
If you're interested in performing research relating to Tor, you might find
the following tools useful. Always ensure that the research you are performing
is [safe](/safetyboard).
## Test Networks
New design proposals and attacks on Tor are challenging to test in the live
network due to deployment issues and the risk of invading users’ privacy. The
following tools allow you to easily run a test Tor network, isolated from the
live public network, that you can safely perform experimentation on.
* [Chutney](
is a Tor test network configuration tool that can launch Tor processes and
estabilsh connectivity between them. It can also be used for CPU-limited
bandwidth testing.
* [Shadow]( is a network simulator/emulator hybrid
that uses archived Tor directory data to generate realistic network
You might also choose to build a testing network manually, or using your
preferred configuration management tool. See the [testing network
of the tor configuration file for more details.
## Path Selection
The relays chosen for a path through the Tor network require tradeoffs to be
made between anonymity, performance, and other properties.
* [TorPS]( simulates changes to Tor's path selection
algorithm using archived data.
## Controllers
A controller allows applications to interact with Tor. This happens via the
[Tor Control Protocol]( Various
events such as circuit creation and bandwidth counts will be able to be read
from the Tor process. Commands can also be given to change the configuration of
the Tor process or to instruct it to perform tasks.
* [Stem]( is a Python controller library for Tor,
used in the [Nyx]( monitor application.
* [jtorctl]( is a Java controller
library for Tor, used in the
Android app.
## Parsing Libraries
The following libraries help you with parsing Tor network data, either from a
directory authority or the
[CollecTor]( service:
* [Tor Metrics Library]( is a
Java library, used by [Tor Metrics]( to
produce analysis and visualisations, including parsers for Tor-specific data
* [Stem]( is a Python library that includes
parsers for Tor-specific data formats.
* [Zoossh]( is a parser written in Go
for Tor-specific data formats.
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment