Money Laundering and Terrorist Financing through the Onion Routing (on the Example of TOR Browser )

Abstract

This article is devoted to the use of onion routing for AML/CFT and the question of its regulation through various legal acts. The browser TOR is examined as the best implementation of this type of routing. The article describes precedents of TOR misuse.

 

Keywords: money laundering, onion routing, TOR browser

References
[1] Michael G. Reed, Paul F. Syverson, David M. Goldschlag. Anonymous Connections and Onion Routing


[2] Paul Buder, Daniel Heyne, and Martin Peter Stenzel. Performance of TOR


[3] Federal Law, dated 29.07.2017 N 276-FZ ”On implementation of changes into the Federal Law “About information, information technologies and information sicurity”


[4] Roscomnadzor: Opera and others are testing locks of block bypasses through VPNservices [site]. URL: https://vc.ru/28254-roskomnadzor-opera-i-drugie-testiruyutzapret-obhoda-blokirovok-cherez-vpn-servisy (10.11.2017)


[5] TOR: Power Digital Resistance [сайт]. URL: https://www.TORproject.org (1.11.2016)


[6] Access zone: the law on anonymizers has come into force in Russia [site]. URL: https://russian.rt.com/russia/article/445118-vpn-TOR-obhod-blokirovok (5.11.2017)