As of this month, 567 relays from our 2014 Tor Challenge are still up and running—more than were established during the entire inaugural Tor Challenge back in 2011. To put that number in perspective, these nodes represent more than 8.5% of the roughly 6,500 public relays currently active on the entire Tor network, a system that supports more than 2-million directly connecting clients worldwide.

Tor is a tool that protects privacy on the Internet by routing web traffic through a series of nodes, or “relays,” creating a network of servers that act as way stations on data’s journey from point A to point B. By providing an indirect, randomized path for Web traffic, the Tor network divorces the user’s IP address (and therefore their location) from the content they are viewing. Picture a kid passing notes in class through a random series of students, as opposed to a letter sent straight to its destination: traffic routed through Tor isn’t stamped with a return address and is difficult to trace back to its sender if it’s intercepted.

The more relays present in the Tor network, the better traffic will be disguised as it travels through that network. This service has helped to ensure anonymity for whistleblowers and journalists handling sensitive information, domestic abuse survivors whose safety might be compromised by revealing their whereabouts, citizens of countries that actively censor the Internet, and others who don’t want to be tracked or traced online.

The 2014 Tor Challenge campaigned to strengthen the Tor network by encouraging people to set up new Tor nodes. We joined forces with the Free Software Foundation, Freedom of the Press Foundation, and the Tor Project, ultimately inspiring the creation of more than 1,600 new relays over a period of three months.

We extend our thanks and congratulations to the individuals behind the 567 relays still active more than a year after the Tor Challenge’s conclusion.

tor challenge graph

As promised, we’re celebrating these privacy guardians with limited-edition t-shirts and stickers. If you see someone sporting one of these, you can thank them for helping to protect privacy on the Internet:

tor challenge shirts

And here are the stickers that folks who still have Tor nodes up will be receiving:

stickers

Inspired to use the Tor network? You can download and install the Tor Browser Bundle, which includes the Tor browser itself and the software needed to run it, through our handy Surveillance Self-Defense guide. The guide also has plenty of other useful information on protecting your data, secure deletion, safely attending protests, and more. Even if you’re not worried about anonymizing your own online activity, you can still set up your own Tor relay to make everyone on the networkincluding some of the Internet’s most vulnerable usersa little safer.

Related Issues