Tor and Anonymity Systems

  1. Foundational Concepts of Anonymity Networks
    1. Mix Networks
      1. Principles of Mix Networks
        1. Message Batching
          1. Traffic Mixing
            1. Cryptographic Protection
            2. Chaumian Mixes
              1. Original Mix Design
                1. Message Shuffling
                  1. Delayed Forwarding
                    1. Cryptographic Layers
                    2. Mix Network Topologies
                      1. Cascade Networks
                        1. Free-Route Networks
                          1. Stratified Networks
                          2. Batching Strategies
                            1. Fixed-Size Batches
                              1. Timed Batches
                                1. Threshold Batches
                                2. Dummy Traffic
                                  1. Cover Traffic Generation
                                    1. Traffic Padding
                                      1. Constant Rate Systems
                                    2. Latency Classifications
                                      1. High-Latency Systems
                                        1. Email-like Applications
                                          1. Store-and-Forward
                                            1. Strong Anonymity Guarantees
                                            2. Low-Latency Systems
                                              1. Real-time Communication
                                                1. Interactive Applications
                                                  1. Weaker Anonymity Guarantees
                                                  2. Trade-offs Between Latency and Anonymity
                                                  3. The Anonymity Trilemma
                                                    1. Latency Requirements
                                                      1. Bandwidth Efficiency
                                                        1. Anonymity Strength
                                                          1. System Design Compromises
                                                          2. Threat Models
                                                            1. Local Adversary
                                                              1. Network Eavesdropping
                                                                1. Limited Observation Capabilities
                                                                2. Global Passive Adversary
                                                                  1. Complete Network Observation
                                                                    1. Traffic Correlation Capabilities
                                                                    2. Active Adversary
                                                                      1. Traffic Injection
                                                                        1. Node Compromise
                                                                          1. Protocol Manipulation
                                                                          2. Adaptive Adversary
                                                                            1. Learning Capabilities
                                                                              1. Strategy Adjustment