|Tor use in Egypt spikes at onset of revolution...|
"We're glad that the Internet Service Providers in Egypt are announcing their routes to the world and have rejoined the Internet. We are concerned because it is possible that traffic crossing the Egyptian border is being recorded and possibly saved for future use. Correctly using Tor to and from Egyptian destinations will keep your traffic anonymous.
Tor separates who you are from where you are going on the Internet. It's up to you, the user, to choose where you share your personal information. Currently, we do not try very hard to hide that you are using Tor. In the past few years, we haven't needed to hide. Tor looks like an SSL connection on the wire. Your local ISP, if they are very clever, could map your current connections from your assigned IP address to the list of public Tor relays. This would only tell them you are using Tor, not where you are going on the Internet. We do offer bridge relays, which are semi-public relays published in a few selective ways. By using bridges, your ISP is unlikely to figure out you are using Tor. We need thousands more bridges, please join the Tor network to help others.
Many years ago, we theorized this arms race could happen. Recent events have turned theory into reality. We are working on improvements to make it much more difficult to detect Tor usage. These methods include normalization of our TLS usage and tunneling Tor through other protocols, such as XMPP, HTTPS, and HTTP.
Thanks to some funding from Avaaz, we've also begun experimenting with ways to make Tor perform better on satellite and mesh networks. We have Tor working well on mobile phone 3G and 4G connections. Tor over VSAT and BGAN connections does work, however it needs more research into how to better handle the variable latencies and varying available bandwidth on such connections. The improvements that result from this research will benefit those with little to no Internet access, whether due to political unrest, natural disasters, or remote locations, who nonetheless seek to keep their online activities safe."
From the Tor Project Blog