1. bookVolume 2022 (2022): Issue 2 (April 2022)
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year
access type Open Access

Increasing Adoption of Tor Browser Using Informational and Planning Nudges

Published Online: 03 Mar 2022
Volume & Issue: Volume 2022 (2022) - Issue 2 (April 2022)
Page range: 152 - 183
Received: 31 Aug 2021
Accepted: 16 Dec 2021
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year

Browsing privacy tools can help people protect their digital privacy. However, tools which provide the strongest protections—such as Tor Browser—have struggled to achieve widespread adoption. This may be due to usability challenges, misconceptions, behavioral biases, or mere lack of awareness. In this study, we test the effectiveness of nudging interventions that encourage the adoption of Tor Browser. First, we test an informational nudge based on protection motivation theory (PMT), designed to raise awareness of Tor Browser and help participants form accurate perceptions of it. Next, we add an action planning implementation intention, designed to help participants identify opportunities for using Tor Browser. Finally, we add a coping planning implementation intention, designed to help participants overcome challenges to using Tor Browser, such as extreme website slowness. We test these nudges in a longitudinal field experiment with 537 participants. We find that our PMT-based intervention increased use of Tor Browser in both the short- and long-term. Our coping planning nudge also increased use of Tor Browser, but only in the week following our intervention. We did not find statistically significant evidence of our action planning nudge increasing use of Tor Browser. Our study contributes to a greater understanding of factors influencing the adoption of Tor Browser, and how nudges might be used to encourage the adoption of Tor Browser and similar privacy enhancing technologies.


[1] Henk Aarts, Ap Dijksterhuis, and Cees Midden. To plan or not to plan? Goal achievement or interrupting the performance of mundane behaviors. European Journal of Social Psychology, 29(8):971–979, 1999.10.1002/(SICI)1099-0992(199912)29:8<971::AID-EJSP963>3.0.CO;2-A Search in Google Scholar

[2] Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. Privacy and human behavior in the age of information. Science, 347(6221):509–514, 2015.10.1126/science.aaa1465 Search in Google Scholar

[3] Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. Secrets and likes: The drive for privacy and the difficulty of achieving it in the digital age. Journal of Consumer Psychology, 30(4):736–758, 2020. Search in Google Scholar

[4] Alessandro Acquisti, Manya Sleeper, Yang Wang, Shomir Wilson, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, and Florian Schaub. Nudges for Privacy and Security. ACM Computing Surveys, 50(3):1–41, August 2017.10.1145/3054926 Search in Google Scholar

[5] Elham Al Qahtani, Mohamed Shehab, and Abrar Aljohani. The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians. SOUPS @ USENIX Security Symposium, 2018. Search in Google Scholar

[6] Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, and Nhan Nguyen. “...better to use a lock screen than to worry about saving a few seconds of time” - Effect of Fear Appeal in the Context of Smartphone Locking Behavior. Symposium on Usable Privacy and Security, 2017. Search in Google Scholar

[7] Hazim Almuhimedi. Helping Smartphone Users Manage their Privacy through Nudges. Technical Report CMU-ISR-17-111, December 2017. Search in Google Scholar

[8] Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Cranor, and Yuvraj Agarwal. Your location has been shared 5,398 times!: A field study on mobile app privacy nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015.10.1145/2702123.2702210 Search in Google Scholar

[9] Mashael Alsabah and Ian Goldberg. Performance and Security Improvements for Tor: A Survey. ACM Computing Surveys, 49(2):1–36, November 2016. https://dl.acm.org/doi/10.1145/2946802.10.1145/2946802 Search in Google Scholar

[10] arma. Bittorrent over Tor isn’t a good idea, April 2010. https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea. Search in Google Scholar

[11] Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information: Pew Research Center. November 2019. Search in Google Scholar

[12] Ariane Bélanger-Gravel, Gaston Godin, and Steve Amireault. A meta-analytic review of the effect of implementation intentions on physical activity. Health Psychology Review, 7(1):23–54, March 2013.10.1080/17437199.2011.560095 Search in Google Scholar

[13] Veronika Brandstätter, Angelika Lengfelder, and Peter M Gollwitzer. Implementation Intentions and Efficient Action Initiation. Journal of personality and social psychology, 81(5):946, 2001.10.1037/0022-3514.81.5.946 Search in Google Scholar

[14] Virginia Braun and Victoria Clarke. Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2):77–101, January 2006.10.1191/1478088706qp063oa Search in Google Scholar

[15] Yinzhi Cao, Song Li, and Erik Wijmans. (Cross-)Browser Fingerprinting via OS and Hardware Level Features. Network and Distributed System Security Symposium, March 2017.10.14722/ndss.2017.23152 Search in Google Scholar

[16] Cloudflare. Understanding Cloudflare Tor support and Onion Routing, February 2021. https://support.cloudflare.com/hc/en-us/articles/203306930-Understanding-Cloudflare-Tor-support-and-Onion-Routing. Search in Google Scholar

[17] Roger Dingledine and Steven J Murdoch. Performance Improvements on Tor or, Why Tor is slow and what we’re going to do about it. Technical report, March 2009. https://svn-archive.torproject.org/svn/projects/roadmaps/2009-03-11-performance.pdf. Search in Google Scholar

[18] P. Dolan, M. Hallsworth, D. Halpern, D. King, R. Metcalfe, and I. Vlaev. Influencing behaviour: The mindspace way. Journal of Economic Psychology, 33(1):264–277, February 2012. https://linkinghub.elsevier.com/retrieve/pii/S0167487011001668.10.1016/j.joep.2011.10.009 Search in Google Scholar

[19] DuckDuckGo. A Study on Private Browsing: Consumer Usage, Knowledge, and Thoughts. Whitepaper, January 2017. Search in Google Scholar

[20] Jim Finkle. Web tools help protect human rights activists. Reuters, August 2009. https://www.reuters.com/article/us-column-pluggedin-idUSTRE57I4IE20090819. Search in Google Scholar

[21] Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, and Nasir Memon. Peeling the Onion’s User Experience Layer. ACM SIGSAC Conference on Computer and Communications Security (CCS ’18), October 2018.10.1145/3243734.3243803 Search in Google Scholar

[22] Kevin Gallagher, Sameer Patil, and Nasir D. Memon. New Me - Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. Symposium on Usable Privacy and Security, 2017. Search in Google Scholar

[23] Nina Gerber, Paul Gerber, and Melanie Volkamer. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77:226–261, August 2018. https://linkinghub.elsevier.com/retrieve/pii/S0167404818303031.10.1016/j.cose.2018.04.002 Search in Google Scholar

[24] Peter M. Gollwitzer. Implementation intentions: Strong effects of simple plans. American Psychologist, 54(7), 1999.10.1037/0003-066X.54.7.493 Search in Google Scholar

[25] Dan Goodin. Majority of Android VPNs can’t be trusted to make users more secure | Ars Technica, January 2017. https://arstechnica.com/information-technology/2017/01/majority-of-android-vpns-cant-be-trusted-to-make-users-more-secure/. Search in Google Scholar

[26] Google. Requests for User Information FAQs - Transparency Report Help Center, 2021. https://support.google.com/transparencyreport/answer/9713961?hl=en. Search in Google Scholar

[27] Glenn Greenwald and Ewen MacAskill. NSA Prism program taps in to user data of Apple, Google and others. The Guardian, June 2013. https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data. Search in Google Scholar

[28] Ilya Grigorik. Networking 101: Transport Layer Security (TLS). In High Performance Browser Networking. O’Reilly Media, Inc., 2013. https://hpbn.co/transport-layer-security-tls/. Search in Google Scholar

[29] Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor. Away From Prying Eyes - Analyzing Usage and Understanding of Private Browsing. SOUPS @ USENIX Security Symposium, 2018. Search in Google Scholar

[30] Cormac Herley. So long, and no thanks for the externalities - the rational rejection of security advice by users. NSPW, pages 133–144, 2009.10.1145/1719030.1719050 Search in Google Scholar

[31] Rae Hodge. Why you should be skeptical about a VPN’s nologs claims, July 2020. https://www.cnet.com/news/why-you-should-be-skeptical-about-a-vpns-no-logs-claims/. Search in Google Scholar

[32] Angelika Lengfelder and Peter M Gollwitzer. Reflective and Reflexive Action Control in Patients With Frontal Brain Lesions. Neuropsychology, 15(1):80, 2001.10.1037/0894-4105.15.1.80 Search in Google Scholar

[33] Johanna Catherine Maclean, John Buckell, and Joachim Marti. Information Source and Cigarettes: Experimental Evidence on the Messenger Effect. Technical Report w25632, National Bureau of Economic Research, Cambridge, MA, March 2019. http://www.nber.org/papers/w25632.pdf. Search in Google Scholar

[34] Mary Madden and L. Rainie. Americans’ Attitudes about Privacy, Security and Surveillance. Pew Research Center, May 2015. Search in Google Scholar

[35] James E Maddux and Ronald W Rogers. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of experimental social psychology, 19(5):469–479, 1983. Search in Google Scholar

[36] Salvatore S. Mangiafico. Kruskal–wallis test, Feb 2020. https://rcompanion.org/handbook/F_08.html. Search in Google Scholar

[37] Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, and Micah Sherr. Understanding Tor Usage with Privacy-Preserving Measurement. In Proceedings of the Internet Measurement Conference, pages 175–187, Boston MA USA, October 2018. ACM. https://dl.acm.org/doi/10.1145/3278532.3278549.10.1145/3278532.3278549 Search in Google Scholar

[38] Jonathan R. Mayer and John C. Mitchell. Third-Party Web Tracking: Policy and Technology. IEEE Symposium on Security and Privacy, 2012. Search in Google Scholar

[39] Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, and Edgar Weippl. Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. IEEE European Symposium on Security and Privacy (EuroS&P), March 2017.10.1109/EuroSP.2017.26 Search in Google Scholar

[40] Chance Miller. iOS 13 cracks down on location permission settings, June 2019. https://9to5mac.com/2019/06/08/ios-13-location-permissions/. Search in Google Scholar

[41] Sarah Milne, Sheina Orbell, and Paschal Sheeran. Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British Journal of Health Psychology, 7(2):163–184, May 2002.10.1348/13591070216942014596707 Search in Google Scholar

[42] Sarah Milne, Paschal Sheeran, and Sheina Orbell. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory. Journal of Applied Social Psychology, 30(1):106–143, January 2000.10.1111/j.1559-1816.2000.tb02308.x Search in Google Scholar

[43] Chris Morran. House Votes To Allow Internet Service Providers To Sell, Share Your Personal Information, March 2017. https://www.consumerreports.org/consumerist/house-votes-to-allow-internet-service-providers-to-sell-share-your-personal-information/. Search in Google Scholar

[44] Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. Workshop on Usable Security, February 2014.10.14722/usec.2014.23022 Search in Google Scholar

[45] Gabriele Oettingen and Gaby Ho. Effective self-regulation of goal attainment. International journal of educational research, pages 705–732, 2000.10.1016/S0883-0355(00)00046-X Search in Google Scholar

[46] Office of the Privacy Commissioner of Canada. What an IP Address Can Reveal About You, May 2013. https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/ip_201305. Search in Google Scholar

[47] Eyal Peer, Laura Brandimarte, Sonam Samat, and Alessandro Acquisti. Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology, 70(C):153–163, May 2017.10.1016/j.jesp.2017.01.006 Search in Google Scholar

[48] Jonathon W. Penney. Chilling Effects: Online Surveillance and Wikipedia Use. Berkeley Technology Law Journal, 31(1):117–182, 2016. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2769645. Search in Google Scholar

[49] Mike Perry, Erinn Clark, Steven Murdoch, and Georg Koppen. The Design and Implementation of the Tor Browser, June 2018. https://2019.www.torproject.org/projects/torbrowser/design/. Search in Google Scholar

[50] Nathaniel Popper. The Tax Sleuth Who Took Down a Drug Lord. The New York Times, December 2015. https://www.nytimes.com/2015/12/27/business/dealbook/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html. Search in Google Scholar

[51] Prolific Support Team. Ineligibility issues, April 2021. https://www.reddit.com/r/ProlificAc/comments/ms114h/ineligibility_issues/. Search in Google Scholar

[52] Prolific Support Team. Ineligibility issues: Fix update, April 2021. https://www.reddit.com/r/ProlificAc/comments/n0f1me/ineligibility_issues_fix_update/. Search in Google Scholar

[53] Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples. IEEE SP, 2019.10.1109/SP.2019.00014 Search in Google Scholar

[54] Ronald W Rogers. A Protection Motivation Theory of Fear Appeals and Attitude Change. The Journal of Psychology, 91(1):93–114, 1975.10.1080/00223980.1975.991580328136248 Search in Google Scholar

[55] Ronald W Rogers and Steven Prentice-Dunn. Protection motivation theory. 1997. Search in Google Scholar

[56] Choe Sang-Hun. In Reporting on North Korea, Tech Helps Break Through Secrecy. The New York Times, July 2017. https://www.nytimes.com/2017/07/05/technology/personaltech/in-reporting-on-north-korea-tech-helps-break-through-secrecy.html. Search in Google Scholar

[57] Paschal Sheeran, Sarah Milne, Thomas L. Webb, and Peter M. Gollwitzer. Implementation Intentions and Health Behaviour. 2005. Search in Google Scholar

[58] Paschal Sheeran, Thomas L. Webb, and Peter M. Gollwitzer. The Interplay Between Goal Intentions and Implementation Intentions. Personality and Social Psychology Bulletin, 31(1):87–98, January 2005. https://doi.org/10.1177/0146167204271308.10.1177/014616720427130815574664 Search in Google Scholar

[59] Signal. Signal Messenger, 2021. https://signal.org/. Search in Google Scholar

[60] Falko F. Sniehotta, Ralf Schwarzer, Urte Scholz, and Benjamin Schüz. Action planning and coping planning for long-term lifestyle change: Theory and assessment. European Journal of Social Psychology, 35(4):565–576, 2005. Search in Google Scholar

[61] Daniel J Solove. The Myth of the Privacy Paradox. George Washington Law Review, 89:52, 2021.10.2139/ssrn.3536265 Search in Google Scholar

[62] steph. How Has Tor Helped You? Send Us Your Story., February 2019. https://blog.torproject.org/how-has-tor-helped-you-send-us-your-story. Search in Google Scholar

[63] Peter Story. Tor browser study: Preregistration, Mar 2020. https://osf.io/bc42h. Search in Google Scholar

[64] Peter Story. Tor browser study: Study page, Mar 2020. https://osf.io/t7qe2. Search in Google Scholar

[65] Peter Story. Switch from POST to GET for DDG Searches, January 2021. https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40287. Search in Google Scholar

[66] Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. From Intent to Action - Nudging Users Towards Secure Mobile Payments. SOUPS @ USENIX Security Symposium, 2020. Search in Google Scholar

[67] Peter Story, Daniel Smullen, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. Awareness, Adoption, and Misconceptions of Web Privacy Tools. Proceedings on Privacy Enhancing Technologies, 2021(3):308–333, July 2021. https://www.sciendo.com/article/10.2478/popets-2021-0049.10.2478/popets-2021-0049 Search in Google Scholar

[68] Gail M. Sullivan and Richard Feinn. Using Effect Size—or Why the PValue Is Not Enough. Journal of Graduate Medical Education, 4(3):279–282, September 2012.10.4300/JGME-D-12-00156.1344417423997866 Search in Google Scholar

[69] Richard H Thaler and Cass R Sunstein. Nudge: Improving Decisions About Health, Wealth, and Happiness. J. Wiley and Sons, 2008. Search in Google Scholar

[70] The Monero Project. Monero - secure, private, untraceable, 2021. https://www.getmonero.org//index.html. Search in Google Scholar

[71] The Tor Project. Overview, April 2020. https://2019.www.torproject.org/about/overview.html.en. Search in Google Scholar

[72] The Tor Project. Am I totally anonymous if I use Tor?, 2021. https://support.torproject.org/faq/staying-anonymous/. Search in Google Scholar

[73] The Tor Project. Anonymity Online, 2021. https://torproject.org. Search in Google Scholar

[74] The Tor Project. Download, 2021. https://www.torproject.org/download/. Search in Google Scholar

[75] The Tor Project. GitLab, 2021. https://gitlab.torproject.org/tpo/team. Search in Google Scholar

[76] The Tor Project. Relay Operations, 2021. https://community.torproject.org/relay/. Search in Google Scholar

[77] The Tor Project. Should I install a new add-on or extension in Tor Browser, like AdBlock Plus or uBlock Origin?, 2021. https://support.torproject.org/tbb/tbb-14/. Search in Google Scholar

[78] Maciej Tomczak and Ewa Tomczak. The need to report effect size estimates revisited. An overview of some recommended measures of effect size. Trends in Sport Sciences, pages 19–25, July 2014. Search in Google Scholar

[79] Thomas L. Webb and Paschal Sheeran. Identifying good opportunities to act: Implementation intentions and cue discrimination. European Journal of Social Psychology, 34(4):407–419, 2004. https://onlinelibrary.wiley.com/doi/abs/10.1002/ejsp.205.10.1002/ejsp.205 Search in Google Scholar

[80] WhatIsMyIPAddress.com. How does geolocation work?, November 2020. https://whatismyipaddress.com/geolocation. Search in Google Scholar

[81] Wikipedia. Web tracking. Wikipedia, May 2021. https://en.wikipedia.org/w/index.php?title=Web_tracking&oldid=020976696. Search in Google Scholar

[82] Kim Witte and Mike Allen. A meta-analysis of fear appeals: Implications for effective public health campaigns. Personality and Social Psychology Review, 27(5):591–615, 2000. Search in Google Scholar

[83] Yixin Zou, Kevin Roundy, Acar Tamersoy, Saurabh Shintre, Johann Roturier, and Florian Schaub. Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices. CHI, pages 1–15, April 2020.10.1145/3313831.3376570 Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo