منابع مشابه
Tor-powered Decentralized DNS for Tor Onion Services
Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in t...
متن کاملTOR - Didactic Pluggable Transport
Considering that access to information is one of the most important aspects of modern society, the actions of certain governments or internet providers to control or, even worse, deny access for their citizens/users to selected data sources has lead to the implementation of new communication protocols. TOR is such a protocol, in which the path between the original source and destination is rand...
متن کاملThrottling Tor Bandwidth Parasites
Tor’s network congestion and performance problems stem from a small percentage of users that consume a large fraction of available network capacity. These users continuously drain relays of excess bandwidth, creating new network bottlenecks and exacerbating the effects of existing ones. This may currently be a performance issue due to unfair resource consumption, but it also shows that the netw...
متن کاملAnother Tor is possible
The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, while maintaining the ability to break the anonymity of a sender in case of misconduct. The revocation of the anonymity will require the use of secret sharing schemes, since we assume that, the lifting ...
متن کاملLinking Tor Circuits
Tor is a popular anonymity network, which hides both the content of traffic as well as the identities of the communicating users. We propose a novel attack that reduces the effects of existing safeguards and significantly degrades the anonymity provided by Tor. We show that an adversary is able to successfully link different circuits belonging to the same user by only controlling the middle nod...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Tidsskrift for Den norske legeforening
سال: 2020
ISSN: 0029-2001
DOI: 10.4045/tidsskr.20.0042