<s>
A	O
wireless	B-Protocol
onion	I-Protocol
router	I-Protocol
is	O
a	O
router	B-Protocol
that	O
uses	O
Tor	B-Application
to	O
connect	O
securely	O
to	O
a	O
network	O
.	O
</s>
<s>
The	B-Application
onion	I-Application
router	I-Application
allows	O
the	O
user	O
to	O
connect	O
to	O
the	O
internet	O
anonymously	O
creating	O
an	O
anonymous	O
connection	O
.	O
</s>
<s>
Tor	B-Application
works	O
using	O
an	O
overlaid	B-Architecture
network	I-Architecture
which	O
is	O
free	O
throughout	O
the	O
world	O
,	O
this	O
overlay	B-Architecture
network	I-Architecture
is	O
created	O
by	O
using	O
numerous	O
relay	O
points	O
created	O
using	O
volunteer	O
which	O
helps	O
the	O
user	O
hide	O
personal	O
information	O
behind	O
layers	O
of	O
encrypted	O
data	O
like	O
layers	O
of	O
an	O
onion	O
.	O
</s>
<s>
Routers	B-Protocol
are	O
being	O
created	O
using	O
Raspberry	B-Operating_System
Pi	I-Operating_System
adding	O
a	O
wireless	O
module	O
or	O
using	O
its	O
own	O
inbuilt	O
wireless	O
module	O
in	O
the	O
later	O
versions	O
.	O
</s>
<s>
This	O
router	B-Protocol
provides	O
encryption	O
at	O
the	O
seventh	O
layer	O
(	O
application	B-Application
layer	I-Application
)	O
of	O
the	O
OSI	O
model	O
,	O
which	O
makes	O
it	O
transparent	O
encryption	O
,	O
the	O
user	O
does	O
not	O
have	O
to	O
think	O
about	O
how	O
the	O
data	O
will	O
be	O
sent	O
or	O
received	O
.	O
</s>
<s>
The	O
encrypted	O
data	O
includes	O
the	O
destination	O
and	O
origin	O
IP	B-Protocol
address	I-Protocol
of	O
the	O
data	O
and	O
the	O
current	O
relay	O
point	O
only	O
knows	O
the	O
previous	O
and	O
the	O
next	O
hop	B-Protocol
of	O
the	O
encrypted	O
packet	B-Protocol
.	O
</s>
<s>
These	O
relay	O
points	O
are	O
selected	O
in	O
a	O
random	O
order	O
and	O
can	O
only	O
decrypt	O
a	O
single	O
layer	O
before	O
forwarding	O
it	O
to	O
the	O
next	O
hop	B-Protocol
where	O
is	O
the	O
procedure	O
is	O
followed	O
unless	O
it	O
is	O
the	O
destination	O
point	O
.	O
</s>
<s>
A	O
wireless	O
router	B-Protocol
which	O
can	O
use	O
the	B-Application
onion	I-Application
router	I-Application
network	O
can	O
be	O
used	O
to	O
keep	O
the	O
user	O
safe	O
from	O
hackers	B-Application
or	O
network	B-Protocol
sniffers	I-Protocol
.	O
</s>
<s>
This	O
setup	O
does	O
not	O
require	O
installation	O
of	O
Tor	B-Application
browser	O
on	O
the	O
work	O
station	O
.	O
</s>
<s>
The	O
applications	O
of	O
wireless	B-Protocol
onion	I-Protocol
router	I-Protocol
are	O
common	O
to	O
a	O
normal	O
router	B-Protocol
,	O
it	O
provides	O
access	O
that	O
allows	O
it	O
to	O
be	O
placed	O
at	O
a	O
site	O
and	O
users	O
can	O
get	O
connected	O
.	O
</s>
<s>
Tor	B-Application
can	O
be	O
used	O
in	O
security	O
focused	O
Operating	O
Systems	O
,	O
messengers	O
,	O
browsers	O
.	O
</s>
<s>
These	O
can	O
be	O
anonymised	O
using	O
Tor	B-Application
network	I-Application
.	O
</s>
<s>
A	O
wireless	B-Protocol
onion	I-Protocol
router	I-Protocol
works	O
on	O
the	O
Tor	B-Application
network	I-Application
and	O
shares	O
the	O
same	O
weaknesses	O
,	O
as	O
mentioned	O
in	O
the	O
Tor	B-Application
page	O
.	O
</s>
<s>
The	O
packets	B-Protocol
that	O
transferred	O
using	O
Tor	B-Application
also	O
are	O
slow	O
because	O
of	O
the	O
increased	O
amount	O
of	O
hops	B-Protocol
with	O
encryption	O
and	O
decryption	O
.	O
</s>
<s>
Anonymous	O
systems	O
if	O
exists	O
on	O
both	O
ends	O
of	O
the	O
network	O
,	O
exit	O
relay	O
and	O
entry	O
relay	O
can	O
sniff	O
the	O
packets	B-Protocol
and	O
statistically	O
correlate	O
the	O
traffic	O
which	O
can	O
point	O
out	O
the	O
destination	O
or	O
the	O
source	O
address	O
of	O
the	O
packet	B-Protocol
.	O
</s>
<s>
This	O
also	O
includes	O
eavesdropping	O
at	O
the	O
exit	B-Application
nodes	I-Application
of	O
the	O
network	O
.	O
</s>
<s>
The	O
data	O
that	O
is	O
between	O
the	O
exit	B-Application
node	I-Application
and	O
the	O
destination	O
server	O
is	O
not	O
encrypted	O
.	O
</s>
<s>
These	O
data	B-Protocol
packets	I-Protocol
can	O
be	O
captured	O
easily	O
.	O
</s>
<s>
There	O
have	O
been	O
tested	O
techniques	O
with	O
one	O
third	O
of	O
control	O
nodes	O
to	O
compromise	O
the	O
Tor	B-Application
network	I-Application
.	O
</s>
<s>
Articles	O
have	O
been	O
proposed	O
which	O
with	O
some	O
partial	O
knowledge	O
of	O
the	O
network	O
give	O
away	O
which	O
nodes	O
are	O
being	O
used	O
to	O
relay	O
the	O
packets	B-Protocol
which	O
reduces	O
the	O
anonymity	O
provided	O
by	O
the	O
network	O
.	O
</s>
<s>
Some	O
protocols	O
can	O
be	O
used	O
to	O
expose	O
the	O
IP	B-Protocol
address	I-Protocol
using	O
tor	B-Application
dissimulation	O
procedures	O
.	O
</s>
<s>
Some	O
of	O
the	O
examples	O
are	O
Inspection	O
of	O
control	O
messages	O
of	O
BitTorrent	O
,	O
Hijacking	O
responses	O
of	O
the	O
trackers	O
,	O
exploitation	O
of	O
distributed	B-Operating_System
hash	I-Operating_System
tables	I-Operating_System
.	O
</s>
