USENIX Association Proceedings of the
نویسندگان
چکیده
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication.
منابع مشابه
USENIX Association Proceedings of the 4 th Annual
Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein.
متن کاملUSENIX Association Proceedings of the 4 th Annual
Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein.
متن کاملA Bibliography of Publications of the USENIX Association : 1990 – 1999
ions for communitybased administration. In USENIX [USE96j], pages 205– 212. ISBN 1-880446-81-2. LCCN QA76.76.O63 S97 1996. URL http://www.usenix.org/ publications/library/proceedings/ lisa96/couch.html.
متن کاملUSENIX Association Proceedings of the 4 th Annual Linux
Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein.
متن کاملX Through the Firewall, and Other Application Relay
Organizations often impose an administrative security policy when they connect to other organizations on a public network such as the Internet Many applications have their own notions of security or they simply rely on the security of the underlying protocols Using the X Window System as a case study we describe some techniques for building application speci c relays that allow the use of appli...
متن کاملUSENIX Association Proceedings of the FREENIX Track : 2002 USENIX Annual Technical Conference
The ext2 filesystem was designed with the goal of expandability while maintaining compatibility. This paper describes ways in which advanced filesystem features can be added to the ext2 filesystem while retaining forwards and backwards compatibility as much as possible. Some of the filesystem extensions that are discussed include directory indexing, online resizing, an expanded inode, extended ...
متن کامل