A reassuring message on Friday from Facebook: “It’s important to us at Facebook to provide methods for people to use our site securely.” That is why Facebook implemented HTTPS across the service and Perfect Forward Secrecy, HSTS (HTTP Strict Transport Security), and other technologies. (In July 2013, Facebook announced they now use https by default for all Facebook users. This means that a person’s browser is told to communicate with Facebook using a secure connection, as indicated by the “https” rather than “http.” This uses Transport Layer Security [TLS] and makes the communication between browser and Facebook servers more secure.) All well and good—but then there is Tor, which has been a challenge for Facebook’s security mechanisms. Alec Muffett, software engineer for security infrastructure at Facebook London, explained why it was a challenge for Facebook use and what Facebook has now done. He said, “from the perspective of our systems a person who appears to be connecting from Australia at one moment may the next appear to be in Sweden or Canada. In other contexts such behavior might suggest that a hacked account is being accessed through a ‘botnet’, but for Tor this is normal.” The security infrastructure would make it difficult for some people connecting to Facebook using Tor, as the algorithms for detecting fraudulent users would get in their way.