Anonymous online purchases with exhaustive operational security
نویسندگان
چکیده
This paper describes the process of remaining anonymous online and its concurrent operational security that has to be performed. It focusses particularly on remaining anonymous while purchasing online goods, resulting in anonymously bought items. Different aspects of the operational security process as well as anonymously funding with cryptocurrencies are described. Eventually it is shown how to anonymously purchase items and services from the hidden web, as well as the delivery. It is shown that, while becoming increasingly difficult, it is still possible to make anonymous purchases. Our presented work combines existing best-practices and deliberately avoids untested novel approaches when possible.
منابع مشابه
A centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملThe demand for products linked to public goods: Evidence from an online field experiment
We conduct a field experiment at a nonprofit organization’s online store to study how demand changes when consumers’ purchases generate revenue for a charitable cause. Consumers respond strongly when their purchases generate small donations by an anonymous outside group, but responses are substantially weaker when the outside donations are relatively large. Responses are also strong when the ou...
متن کاملOnline Exchange Relationships: a Principal– Agent Perspective
Despite a decade since the inception of B2C e-commerce, the uncertainty of the online environment still makes many consumers reluctant to engage in online exchange relationships. Elena Karahanna was the accepting senior editor for this paper. D. Harrison McKnight and Jonathan D. Wareham served as reviewers. The associate editor and the third reviewer chose to remain anonymous. Even if uncertain...
متن کاملAn Efficient and Robust Anonymous Authentication Scheme in Global Mobility Networks
Anonymous user authentication is an essential security mechanism for roaming services in global mobility networks (GLOMONET). Recently, Zhao et al. propose a two-factor anonymous authentication scheme to achieve mutual authentication and session key establishment between the mobile user (MU) and a foreign agent (FA). This paper shows that their scheme has some security vulnerabilities and opera...
متن کاملCustomer Behavior in an Online Ordering Application: A Decision Scoring Model
This research presents the development of behavioral scoring models to predict future customer purchases in an online ordering application. Internet retailing lowers many barriers for customers switching between retailers for repeat purchases; thus, retaining existing customers is a key challenge for achieving profitability. Survey data were collected from 1,089 online customers of two companie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1505.07370 شماره
صفحات -
تاریخ انتشار 2015