Understanding online anonymity

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Onion Routing and Online Anonymity

In this paper we present a technical description of onion routing, an anonymizing protocol that protects users against traffic analysis. Onion routing combines the concepts of proxy redirection and layered mixed-key cryptography to hide the routing of requests from every participant in the network except the originator of the request. We also analyze the performance and potential legal threats ...

متن کامل

Waiting for Anonymity: Understanding Delays in Tor

Although Tor is the most widely used system for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which are sensitive to latency, it is critical to reduce delays in Tor. To take an important step in this direction, we seek an in-depth understanding of delays in Tor. By taking snapshots of the entire Tor network within a...

متن کامل

User Online Anonymity Awareness among Students /

Striving for privacy is a common ambition among humans, especially in the modern world. Therefore, the right to privacy is anchored in diverse rulings and judicial decisions, with the purpose of ensuring an individual's ability to keep and protect his identity, thoughts, emotions, deep secrets, way of life and intimate acts. In addition, the right to privacy makes it possible for a person to ch...

متن کامل

An analysis of tools for online anonymity

The ability to remain anonymous while engaging in different activities online is increasingly sought after by consumers with privacy concerns. Currently the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure onli...

متن کامل

Anonymity and Verifiability in Voting: Understanding (Un)Linkability

Anonymity and verifiability are crucial security requirements for voting. Still, they seem to be contradictory, and confusion exists about their precise meanings and compatibility. In this paper, we resolve the confusion by showing that both can be expressed in terms of (un)linkability: while anonymity requires unlinkability of voter and vote, verifiability requires linkability of voters and el...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Media, Culture & Society

سال: 2019

ISSN: 0163-4437,1460-3675

DOI: 10.1177/0163443719842074