Will they? There’s no way to know. It depends on how closely they’re looking.
Can they? Absolutely.
Become a Patron of Ask Leo! and go ad-free!
TOR: The Onion Router
- It prevents the sites you visit from seeing where you’re coming from, and
- It prevents the internet infrastructure, such as your ISP, from seeing what sites you visit (or what data you exchange with those sites).
The first point is a particularly important aspect of maintaining privacy or anonymity. It’s not the only aspect, to be sure — you can be identified in other ways, so it’s important to behave appropriately when attempting to maintain anonymity.
The second point is a side effect of the encryption involved. While a VPN protects your connection to the VPN service and not beyond, TOR encrypts and obfuscates the connection until immediately prior to the connection to the server or service you’re using.
Your school as your ISP
In providing your internet access, your school (or employer, or hotel, or wherever you might be) owns the networking equipment to which you connect. That equipment — typically one or more routers of various sorts — can do either or both of two things:
- Monitor the traffic that flows across it
- Send a copy of all traffic to another device that can monitor it
By “monitor”, I mean the equipment can watch for a variety of things and act based on what it finds. For instance, it could block access to known porn sites. A more complex example would be watching for and reporting downloads of known copyrighted files.
Watching for TOR
When you connect to TOR, you are connecting to one of several known entry points to the TOR network.
By monitoring the traffic across their network, the school can notice this, and thus see
- that someone is connecting to a TOR entry node, and
- which computer on their local network is doing so: your computer.
So absolutely, they can see that you’re using TOR. They can’t see what you’re connecting to through TOR, but they can see that you’re using it.
Now, will they notice?
Big brother, are you watching?
There’s no way to know.
It depends on many factors, including the technical expertise of whoever set up the network, whether they set it up for monitoring, and whether they actively watch for someone using Tor.
My guess is that most school personnel are so overworked to begin with that they don’t bother. At best, I’d guess they’ll probably configure the equipment to try to block your ability to access the Tor network, and leave it at that. Only if they’re informed that something suspicious is going on might they take a more active interest and monitor more closely.
Here’s the catch: you can’t count on that.
You can’t tell if they’re watching, so you can only assume that they’re watching.
Because they can.
Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.
I'll see you there!