

To ensure the continuity of Tor, a dynamic ecosystem should be built around the network by stimulating further development and research in anonymous communication services. Additionally, Tor deals with financial insecurities and a dependency on volunteers. This has caused lawyer-based attacks and adjustments on the fourth amendment to be a point of discussion. The cover that the network provides attracts criminal behavior and has led to a bad reputation. Tor’s principles of freedom and privacy have also introduced some ethical vulnerabilities. We will discuss published attacks on Tor and categorize them for further analysis. Over the years the attacks have grown to be more complex and effective, increasing the need for hybrid attacks that can be deployed at the network layer, protocol layer or application layer. These vulnerabilities are increasingly exploited by de-anonymizing attacks. Recent papers discuss the vulnerabilities of Tor’s Onion Router design and question the effectiveness of Tor. Tor is the largest anonymous communication network.
