There Are Many Ways to Help Tor Take Back the Internet
This year’s campaign, Take Back the Internet, has been a great success so far. Thank you to the more than 3,000 donors who have helped us raise over $130,000 that will become over $260,000 with Mozilla’s match. This year we set an ambitious goal because the demand for privacy is growing and the demand on the Tor network and our small staff is also increasing.
The most convenient way to support Tor is by donating through our website. Many thanks to those of you who have already done so! There are many other ways to financially support our work that you may not be aware of, some take very little effort and others carry potential benefits for you, the donor.
- Consider a stock donation. Contact us at giving(at)torproject.org for our transfer information. Donors can usually deduct the fair market value of their stock transfer from their taxes and Tor is able to utilize the full amount of the stock for our programs. Please be sure to talk to your financial for full implications.
- Donate cryptocurrency. We accept many types of cryptocurrency. Like stock, the IRS treats cryptocurrency like property and you may see tax benefits from donating. Be on the lookout because on Giving Tuesday (December 3rd), Tor is participating in The Giving Block’s #BitcoinTuesday efforts, and we will be eligible for additional matching funds for cryptocurrency donated through their platform that day!
- Consider naming the Tor Project a beneficiary in your will or insurance policy. This is a really easy way to ensure Tor will be funded well into the future and able to protect privacy for years to come.
- Designate Tor as your beneficiary on Amazon Smile. We currently receive $750 per quarter from Tor supporters who use Amazon. Just choose the Tor Project from the list of charities.
- Ask your employer if they will match your donation. Usually this just involves filling out a form and providing your gift acknowledgement and your gift will be matched.
- Gift this year’s campaign t-shirt! The holidays are a great time to teach your family and friends about how they can take back the internet by using Tor.
Again, we truly appreciate your support of our work. If you have any questions about giving to Tor, we can be reached at giving(at)torproject.org.
Comments
Please note that the comment area below has been archived.
This is getting ridiculous…
This is getting ridiculous.
How much will it cost to make you stop spamming about this donation thing?
Try us :) In all…
Try us :)
In all seriousness: As a nonprofit organization, fundraising is a critical part of our work.
Really? You dropped by just…
Really? You dropped by just to express your irritation that Tor Project is not in fact "owned by the US government and US corporations" [sic]? Who would do that... unless some government (maybe even the US government, in the form of FBI) is paying them fifty cents per visit?
Hi, can we trust the SSL…
Hi,
can we trust the SSL digicert certificate for TOR?
vulnerabilities on SSL certificates have been revealed!
Can you be more specific…
Can you be more specific about the vulnerabilities?
In this fabulous report from…
In this fabulous report from our good friends at EFF
https://www.eff.org/wp/behind-the-one-way-mirror
the author, Cypher Bennett, very clearly explains how modern corporate surveillance works.
In particular, Bennett describes in detail (see the figure captioned "WiFi hotspots and bluetooth beacons can listen for probes that wireless devices send out automatically. Trackers can use each device’s MAC address to create a profile of it based on where they’ve seen that device.") how vast networks of hotspots (such as the Comcast Xfinity network which operates 18 million of them in the US alone) act as real time location tracking, and how similar networks of Bluetooth sensors can do the same. One key point which is not stressed is that corporations and (municipal, county, state, federal) government agencies sell this kind of data to each other, and increasingly "smart cities" are rolling out government owned networks which act like Comcast Xfinity as a real-time personal electronic device inventory and geolocation tracker. See
https://ocewjwkdco.tudasnich.de/comment/285608#comment-285608
Bennett points out that the latest Apple and Google phones randomize the last few groups of the MAC address, but they give the true MAC if tricked into connection to a hotspot, and cheaper brands of smart phones and most other devices such as PDAs, smart watches, and vehicle control systems never randomize the last few groups of the MAC.
Further, if 802 wireless tracking networks don't get you, Bluetooth beacon networks probably will. Note that many public transit and road maintainance agencies already use Bluetooth to track individuals by following their personal electronic devices.
The lesson is: you need to use Tor. Your family and friends need to use Tor. Absolutely everyone on this planet badly needs Tor for everything they do, on-line or off, right this very minute.
Which means we need to grow the Tor network by many orders of magnitude. Which can only happen if users around the world contribute, either by operating a Tor node or by sending some financial help to Tor Project.
Please, read the report, and ask your family and friends to read it too.
(I am a user with no ties to Tor Project or Tails Project other than as a contributor.)
I know this is off-topic,…
I know this is off-topic, but could you fix grammar at https://ijpaagiacu.tudasnich.de/tbb/tbb-14/
"Tor Browser is specifically engineered to have a nearly identical (we're not perfect!) fingerprint across it's users."
it's -> its
Seems Tor isn't listed…
Seems Tor isn't listed anymore with Amazon Smile, please check :(
it is -- search for "the tor…
it is -- search for "the tor project"
Hello - Please try again. I…
Hello - Please try again. I just verified that we are still listed.
The Tor Project
Seattle, WA Research Institutes and/or Public Policy Analysis
Select
The Tor Project successfully helps global populations burdened by online surveillance and censorship access Internet resources more securely and safely. Tor technologies are used by journalists, activists, political dissidents, human rights workers, whistleblowers, companies, and privacy-sensitive individuals worldwide. These users, including the volunteer operators of over 9,000 network relays and censorship-circumvention bridges, have played an influential role in conflicts around the world.