TOR

How Tor Works

Tor (which stands for “The Onion Router”) is an open source software router that forms networks that keep IP addresses private.

TorDiagrams

Cloak and Tor

Cloak uses the latest stable version of the Tor software (at the time of writing: 0.2.4.24).

The Tor application is configured to run as a transparent proxy in conjunction with the OpenWrt networking stack and Firewall.

Users connected to the Public WiFi will have full access to the Internet.  If the user type in a .onion address, the request will be redirected to the TOR network, so even hidden sites can be accessed this way.

Users connected to the Cloaked WiFi will have all traffic routed through the Tor network (IPv4 TCP requests only).  UDP and IPv6 traffic will be blocked/not forwarded since Tor currently does not support these protocols.

Cloak Functional Description

Users connected to the Public WiFi will have full access to the Internet.

Users connected to the Cloaked WiFi will have all traffic routed through the Tor network (IPv4 TCP requests only).  UDP and IPv6 traffic will be blocked/not forwarded since Tor currently does not support these protocols. If the user type in a .onion address, the request will be redirected to the TOR network, so hidden sites can be accessed this way.

Running Tor as a transparent proxy has been criticized by certain members of the Tor community.  While it would be possible to run Cloak as an isolating proxy this would mean configuration of individual applications on the client side, which in turn would make the Cloak significantly harder and more complicated to use.  We feel that the biggest issue wth Tor as a transparent proxy was the possibility of DNS leaks, and this potential issue have been removed from Cloak by making certain all DNS traffic passes through the Tor network.

We are considering creating a toggle that will make it possible to run Cloak both as a transparent proxy and as an isolating one, but this functionality is still a work in progress.