, Nathan Malkin , Ganesh Iyer , Serge Egelman , and David Wagner Tor ’ s Usability for Censorship Circumvention
نویسندگان
چکیده
Tor has grown beyond its original purpose as an anonymity tool and has become a widely-used cen sorship circumvention tool. This is the first study to ex amine Tor’s usability in this role. We evaluate, design, and test the Tor configuration interface by placing users in simulated censorship environments, instructing them to use Tor to circumvent censorship, and measuring their interactions with the interface. A 16-participant qualitative user study identifies common user struggles while circumventing censorship. We use the results as feedback to redesign the configuration interface. A 114 participant quantitative user study tests the impact of our changes. We find that our changes result in a signif icant reduction in the time spent configuring a connec tions. We conclude with recommendations for changes to the current interface as well as alternative approaches to bootstrapping a connection to Tor.
منابع مشابه
Tor’s Usability for Censorship Circumvention
Tor has grown beyond its original purpose as and has since become an important Internet circumvention tool. We specifically examine it usability as a censorship circumvention tool, an essential facet for adoption and use. We focus our analysis on the connection configuration dialog of Tor browser, as censorship circumvention requires correct transport configurations. Our talk will describe a fu...
متن کاملA Usability Evaluation of Tor
Although Tor has state-of-the art anticensorship measures, users in heavily censored environments will not be able to connect to Tor if they cannot configure their connections. We perform the first usability evaluation of Tor Launcher, the graphical user interface (GUI) that Tor Browser uses to configure connections to Tor. Our study shows that 79% (363 of 458) of user attempts to connect to To...
متن کاملPoster: Games Without Frontiers: Investigating Video Games as a Covert Channel
Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...
متن کاملEnemy At the Gateways: A Game Theoretic Approach to Proxy Distribution
A core technique used by popular proxy-based circumvention systems like Tor, Psiphon, and Lantern is to secretly share the IP addresses of circumvention proxies with the censored clients for them to be able to use such systems. For instance, such secretly shared proxies are known as bridges in Tor. However, a key challenge to this mechanism is the insider attack problem: censoring agents can im...
متن کاملMeasuring and circumventing Internet censorship
An ever increasing amount of governments, organisations, and companies employ Internet censorship in order to filter the free flow of information. These efforts are supported by an equally increasing number of companies focusing on the development of filtering equipment. Only what these entities consider right can pass the filters. This practice constitutes a violation of the Universal Declarat...
متن کامل