I was of a slightly different impression, but have no idea what is the "truth".
"Tor was not started by the US Navy. The US Naval Research Labs (NRL) started a project in the 1990s called onion routing7. Tor uses the basic onion routing principles and applies them to the Internet. The volunteer Tor group started in 2001. The formal charity, The Tor Project, started in 2006. We continue to work with Dr. Paul Syverson from NRL on improving onion routing and therefore Tor."
Not started by the US Navy but started by US Naval Research Labs instead? Is there any practical difference except where it appears on a military budget sheet? :)
If you ignore some of the drama, Pando has a very long and fairly comprehensive look at its funding (at least, it seemed comprehensive to me, I am not a Tor expert) - http://pando.com/2014/07/16/tor-spooks/
Yes, the government funds Tor. Pando thinks that all of the US government is akin to the NSA and wants to spy on people. This is not how it works. The government is not just one body and there are many parts of it that probably don't agree with what the NSA is doing.
Yes Tor is funded by the US government. My question is, how does it matter? The protocol is open. The code is open. There are research groups at some major universities researching on Tor.
> This is not how it works. The government is not just one body and there are many parts of it that probably don't agree with what the NSA is doing.
This, I think, is a very important point. It is beyond naive to assume that a large body of structures that together are called "the US government" is a homogeneous entity that can be ascribed goals as if it were a single agent.
"Securing government comms" can be misleading. Tor is not by itself a secure channel, but may be part of a secure channel if you're concerned that a local or semi-local adversary may intercept your communications. My understanding is that Tor was developed primarily to facilitate informants and dissidents in countries with restrictive internet access policies, like China, who would not take kindly to seeing communications between Chinese IPs and U.S. military IPs.
There is a very widespread and dangerous misconception that Tor is a one-stop shop for secure or anonymous communication. This is not true. You need to encrypt your messages separately. When outside the onion network, Tor actually exposes all content sent through it to a third-party, the exit node. This means using Tor may be more dangerous than not using Tor if you don't know what you're doing.
Very good point. In fact, I had to council one of my colleagues on this issue as she prepares for an overseas trip. She was asking about Tor, but I advised that our organization's VPN is the correct solution... especially since she wanted confidentiality rather than anonymity.
Source: https://www.torproject.org/about/overview