



They pioneered the first prototypes of onion-routing. According to the official Tor website, the lack of security on the Internet and its ability to be used for tracking and surveillance was already abundantly clear as far back as 1995, so the NRL sought to create Internet connections that don’t reveal identities, even to someone or some entity monitoring the network. This tutorial demonstrates how to build a Tor-Bridge relay with a Raspberry Pi 2, which is essentially a decentralized node relaying a constituent layer of encrypted-data that is ultimately combined with the entire layer of data processed in part with other Tor-nodes, or “bridges” on the network. The United States Naval Research Laboratory (NRL) developed “The Onion Routing Protocol” (Tor) to securely relay intelligence online via layered encryption. The United States Naval Research Laboratory developed “The Onion Routing Protocol” (Tor)
