Tor Switches to New Counter Galois Onion Relay Encryption Algorithm
Counter Galois Onion replaces tor1 encryption to fix cryptographic flaws and improve relay security with forward secrecy and stronger authentication, while keeping bandwidth modest.
8 Articles
8 Articles
The Tor project is rebuilding one of the oldest cryptographic algorithms powering the dark web
The developers behind the Tor network have announced a major upcoming change. The free overlay network, which enables anonymous communication on the web, will soon adopt a new encryption algorithm, boosting security for an already powerful privacy tool.Read Entire Article
Tor is switching to the Counter Galois Onion encryption algorithm
Tor (The Onion Router) is switching its encryption algorithm to help boost security and privacy. The change is being introduced to protect users against certain types of attack, and sees the browser adopting a new “research-backed new design” called Counter Galois Onion. The algorithm that is being updated is the one used to encrypt user data as it travel across a circuit via multiple relays. In making the switch, Tor concedes that its previous …
November 26, 2025 15:28 Software News 02.18K #SoftwareNews Tor will abandon its oldest encryption algorithm, Tor1, and instead use a newly developed algorithm called CGO to address node tagging attacks and message tampering.
Tor Adopts CGO Encryption to Defend Against Advanced Surveillance
The new Counter Galois Onion algorithm replaces outdated Tor1 encryption, offering better protection against traffic manipulation, key theft,… The post Tor Adopts CGO Encryption to Defend Against Advanced Surveillance appeared first on IMP.NEWS.
Good news, friends, Tor has just implemented CGO (Counter Galois Onion)! If it doesn't tell you anything, it's normal, I didn't know either, but I'm going to explain everything! Until now, the Tor network protected your anonymity with onion encryption. Several layers of crypto, one by relay and it works well... except that there's a vicious technique that we call tagging attacks. Tagging is when an attacker changes your encrypted traffic at diff…
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium




