Roger Dingledine
Roger Dingledine is an American computer scientist known for having co-founded Tor Project.[1] A student of mathematics, computer science, and electrical engineering,[2] Dingledine is also known by the pseudonym arma.[3] As of December 2016, he continues in a leadership role with the Tor Project, as a project Leader, Director, and Research Director.[4]
Roger Dingledine | |
---|---|
Roger Dingledine in 2013 | |
Born | Roger Dingledine United States |
Nationality | American |
Occupation | Director and Research Director, Tor Project |
Known for | Co-Founding Tor and the Tor Project |
Career
Tor Project
Tor was developed by Dingledine—with Nick Mathewson and Paul Syverson[4]—under a contract from the United States Naval Research Laboratory.[1] As of 2006, the software they developed was being distributed using proceeds from the Electronic Frontier Foundation, by the Tor Project.[1] As described at the end of 2015,
The Tor Project develops and maintains ... The Tor Browser system, also known as The Onion Router ... a free, open source and sophisticated privacy tool that provides anonymity for web surfing and communication
as well as developing and maintaining other software tools and applications.[5][6] As of December 2016, Dingledine continues in a leadership role with the Tor project, as a Project Leader, Director, and Research Director.[4] Isabela Bagueros acts as the Tor project's Executive Director. She took over this role in January 2019, having previously been a Project Manager at the Tor project since 2015.[7]
Awards and honors
Dingledine was named as one of the 2006 thirty-five Innovators Under 35 by MIT Technology Review, for his work on internet anonymization technologies through the Tor Project.[1] The Review described the importance of the work in this way:
A dissident in China uses Web-based e-mail to contact a journalist in Canada. An intelligence agency wants to surveil a foreign website. Like every operation on the Internet, these activities leave tracks. Online anonymity measures provide a way around this problem; one of the most advanced is Tor, or the Onion Router. / Computer scientist Roger Dingledine developed Tor ...[1]
Media attention
Dingledine has drawn attention after the leak of NSA documents by Edward Snowden, and public disclosure of the rules guiding the operation of XKeyscore, the NSA's collection system, given XKeyscore's targeting of Tor Project onion servers, including the one Dingledine runs at MIT, which serves a directory authority for the system, as well as being the base of operation of the MixMinion mail service, and host to various gaming and other websites (from which the NSA might be collecting IP addresses).[8]
References
- MIT Tech Rev Staff (2006). "Innovators Under 35: Roger Dingledine" (print and online). MIT Technology Review (September/October). Retrieved 2016-12-31.
- "Roger Dingledine's Curriculum Vitae". freehaven.net. Retrieved 31 December 2016.
- Inc., The Tor Project. "Tor Project: Core People". www.torproject.org. Retrieved 2017-12-16.
- Inc., The Tor Project. "Tor Project: Core People". www.torproject.org.
- Zetter, Kim (2015-12-11). "Tor Hires a New Leader to Help It Combat the War on Privacy" (print and online). Wired. Retrieved 2016-01-04.
- As described by the MIT Technology Review at the time of the launch of The Tor Project, its function at the time was as follows. "To disguise Internet traffic's origins, Tor plots a route through any three of more than 700 volunteer-run Onion routers around the world. It sets up a two-way link between the sender's computer and the final router in the chain; data passed between them is encrypted in three layers, and each router in the chain peels off one layer along the way. Each data packet "remembers" only the address of the last router it visited. That way, even if the data is intercepted before the final router hands it off to the recipient, it's difficult to trace back to the sender." See MIT Tech Rev Staff, 2006, op. cit.
- The Tor Project (2018-04-23). "Announcing Tor's Next Executive Director: Isabela Bagueros".
- Zetter, Kim (2014-07-03). "The NSA Is Targeting Users of Privacy Services, Leaked Code Shows" (print and online). Wired. Retrieved 2016-01-04.
Further reading
- Goodin, Dan (2016-11-29). "Firefox 0-Day in the Wild is Being Used to Attack Tor Users". ArsTechnica. Retrieved 2016-01-04.
Publicly released exploit works reliably against a wide range of Firefox versions.
- Zetter, Kim (2015-12-11). "Tor Hires a New Leader to Help It Combat the War on Privacy" (print and online). Wired. Retrieved 2016-01-04.
- Zetter, Kim (2014-07-03). "The NSA Is Targeting Users of Privacy Services, Leaked Code Shows" (print and online). Wired. Retrieved 2016-01-04.