Anonymous online purchases with exhaustive operational security

نویسندگان

  • Vincent Van Mieghem
  • Johan A. Pouwelse
چکیده

This paper describes the process of remaining anonymous online and its concurrent operational security that has to be performed. It focusses particularly on remaining anonymous while purchasing online goods, resulting in anonymously bought items. Different aspects of the operational security process as well as anonymously funding with cryptocurrencies are described. Eventually it is shown how to anonymously purchase items and services from the hidden web, as well as the delivery. It is shown that, while becoming increasingly difficult, it is still possible to make anonymous purchases. Our presented work combines existing best-practices and deliberately avoids untested novel approaches when possible.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

The demand for products linked to public goods: Evidence from an online field experiment

We conduct a field experiment at a nonprofit organization’s online store to study how demand changes when consumers’ purchases generate revenue for a charitable cause. Consumers respond strongly when their purchases generate small donations by an anonymous outside group, but responses are substantially weaker when the outside donations are relatively large. Responses are also strong when the ou...

متن کامل

Online Exchange Relationships: a Principal– Agent Perspective

Despite a decade since the inception of B2C e-commerce, the uncertainty of the online environment still makes many consumers reluctant to engage in online exchange relationships. Elena Karahanna was the accepting senior editor for this paper. D. Harrison McKnight and Jonathan D. Wareham served as reviewers. The associate editor and the third reviewer chose to remain anonymous. Even if uncertain...

متن کامل

An Efficient and Robust Anonymous Authentication Scheme in Global Mobility Networks

Anonymous user authentication is an essential security mechanism for roaming services in global mobility networks (GLOMONET). Recently, Zhao et al. propose a two-factor anonymous authentication scheme to achieve mutual authentication and session key establishment between the mobile user (MU) and a foreign agent (FA). This paper shows that their scheme has some security vulnerabilities and opera...

متن کامل

Customer Behavior in an Online Ordering Application: A Decision Scoring Model

This research presents the development of behavioral scoring models to predict future customer purchases in an online ordering application. Internet retailing lowers many barriers for customers switching between retailers for repeat purchases; thus, retaining existing customers is a key challenge for achieving profitability. Survey data were collected from 1,089 online customers of two companie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1505.07370  شماره 

صفحات  -

تاریخ انتشار 2015