November 30 2022

How is SecureCo similar to and different from Tor?

SecureCo’s suite of protective obfuscation solutions  includes technology similar to Tor, and has equivalent non-attribution benefits.  We use the same multi-layer encryption, also known as onion routing, to obscure the original source and destination of the data traffic from any node in the middle of the transit route.  Apart from keeping personal user identities private, this method protects the endpoint networks and shields high value data from harvesting or disruption, since it’s much harder for adversaries to identify and target it.  SecureCo’s technology is different from Tor in some important ways.  For one thing, our network is privately managed and operated by us, as opposed to Tor’s open network model of volunteer computing and bandwidth.  This allows us to provide quality of service and guard the network against bad actors. In addition, SecureCo implementations are commonly used for two-way data exchange, where the onion routing extends end-to-end.  This differs from the most common Tor use case, internet browsing, where the last mile exits Tor and does not use onion encryption. The exposure of data exiting Tor creates a vulnerability that the typical SecureCo implementation does not have.