Is the Onion Router a Secure Network?

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tor: The Second-Generation Onion Router

We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design. Tor adds perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for rendezvous points. Tor works on the real-world Internet, requires no special privi...

متن کامل

The Onion Router: Understanding a Privacy Enhancing Technology Community

Internet technologies have made mass surveillance prevalent and much easier to carry out, while at the same time making personal privacy more difficult to protect. The ubiquity of personal data processing has raised public awareness about the infringement of information privacy. To protect users’ information privacy, several initiatives have been developed to provide Privacy Enhancing Technolog...

متن کامل

Tor: The Second-Generation Onion Router (2012 DRAFT)

THIS IS A DRAFT. IT IS NOT FINISHED. We present Tor, a circuit-based low-latency anonymous communication service. This Onion Routing system addresses limitations in the earlier design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, anticensorship features, guard nodes, applicationand user-selectable stream isolation, and ...

متن کامل

Tor : The Second - Generation Onion Router ( 2014 DRAFT v 1 )

We present Tor, a circuit-based low-latency anonymous communication service. This Onion Routing system addresses limitations in the earlier design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, anticensorship features, guard nodes, applicationand user-selectable stream isolation, and a practical design for location-hidde...

متن کامل

Analyzing the Difficulties in Backtracing Onion Router Traffic

The objective of Onion Routing is to make it completely impossible for third parties to perform traffic analysis. This goal is achieved by applying cryptographic techniques to networking. The packets transiting the chain of onion routers thus appear anonymous. Yes, we are talking about a chain. Practically speaking, there is a group of onion routers distributed around the public network, each o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Advanced Forensic Sciences

سال: 2020

ISSN: 2692-5915

DOI: 10.14302/issn.2692-5915.jafs-20-3366