“Tor metrics are the ammunition that lets Tor and other security advocates argue for a more private and secure Internet from a position of data, rather than just dogma or perspective.”
— Bruce Schneier (June 1, 2016)
We estimate the number of users by analyzing the requests induced by clients to relays and bridges.
This graph shows the estimated number of directly-connecting clients; that is, it excludes clients connecting via bridges. These estimates are derived from the number of directory requests counted on directory authorities and mirrors. Relays resolve client IP addresses to country codes, so that graphs are available for most countries. Furthermore, it is possible to display indications of censorship events as obtained from an anomaly-based censorship-detection system (for more details, see this technical report). For further details see these questions and answers about user statistics.
The following events have been manually collected on this wiki page and might be related to the displayed graph.
|Dates||Places/Protocols||Description and Links|
|2015-11-18 to 2015-12-10||Bangladesh <OR> obfs3 obfs4||Bangladesh blocks Facebook, WhatsApp, and Viber.|
News article(archive)Relay graph
|2015-11-04||meek||Tor Browser 5.0.4 and 5.5a4 released, containing a fixed fingerprint for meek-amazon.|
5.0.4 blog post5.5a4 blog postTicket
|2015-10-30||meek||Altered the performance settings on the meek-google App Engine instance. Set max idle instances to 2 and min pending latency to 1000 ms. This used to be configured through the web interface but is now configured in an application file, which at some point caused the settings from 2015-02-28 to be lost.|
|2015-10-30||meek||Further rate-limited the meek-azure bridge to 0.8 MB/s, from 1.1 MB/s.|
|2015-10-09||meek||The fingerprint of the meek-amazon bridge changes, as a result of begin rebooted. Released Tor Browsers with the former fingerprint are unable to connect. The fingerprint changed from 4EE0CC769EB4B15A872F742EDE27D298A59DCADE to 6DDD1DB8526282837C50E9AB5D14AB50150CD624, then again to B9E7141C594AF25699E0079C1F0146F409495296. The new fingerprint shipped with Tor Browser 5.0.4 and 5.5a4 on 2015-11-04.|
|2015-10-09||ipv4 ipv6||geoip and geoip6 databases updated to "October 9 2015 Maxmind GeoLite2 Country" (|
|2015-10-02||meek||Rate-limited the meek-azure bridge to 1.1 MB/s. (Azure grant expired.)|
|2015-09-30 to 2015-10-09||meek||Outage of meek-amazon caused by an expired certificate. As a result of being rebooted, the bridge also changes its fingerprint from 4EE0CC769EB4B15A872F742EDE27D298A59DCADE to 6DDD1DB8526282837C50E9AB5D14AB50150CD624.|
Mailing list post about startMailing list post about endTicket
|2015-09-24||ipv4 ipv6||geoip and geoip6 databases updated to "September 3 2015 Maxmind GeoLite2 Country" (|
|2015-09-23||meek||Upgraded meek-azure bridge from KVM to Xen.|
This material is supported in part by the National Science Foundation under Grant No. CNS-0959138. Any opinions, finding, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. "Tor" and the "Onion Logo" are registered trademarks of The Tor Project, Inc.. Data on this site is freely available under a CC0 no copyright declaration: To the extent possible under law, the Tor Project has waived all copyright and related or neighboring rights in the data. Graphs are licensed under a Creative Commons Attribution 3.0 United States License.