Case study :Privacy-enhancing technologies can do much to protect a user’s information and/or maintain anonymity when using the Web. Research onion routing and the Tor project. What do these things do? How do they work? Type a one page (minimum) paper describing your findings. Please double space your paper and cite your sources.Key terms:Opt-in•Opt-out•Personal Information Protection and Electronic Data Act (PIPEDA)•Personally identifiable information (PII)•Privacy•Privacy Act of 1974•Privacy-enhancing technology (PET)•Privacy impact assessment (PIA)•Privacy policy