Useful Links
Computer Science
Cybersecurity
Tor and Anonymity Systems
1. Introduction to Anonymity and Privacy
2. Foundational Concepts of Anonymity Networks
3. The Tor Network Architecture
4. Using Tor
5. Security Analysis and Attacks
6. Defenses and Countermeasures
7. Alternative Anonymity Systems
8. Legal and Social Context
9. Future Directions and Research
Foundational Concepts of Anonymity Networks
Mix Networks
Principles of Mix Networks
Message Batching
Traffic Mixing
Cryptographic Protection
Chaumian Mixes
Original Mix Design
Message Shuffling
Delayed Forwarding
Cryptographic Layers
Mix Network Topologies
Cascade Networks
Free-Route Networks
Stratified Networks
Batching Strategies
Fixed-Size Batches
Timed Batches
Threshold Batches
Dummy Traffic
Cover Traffic Generation
Traffic Padding
Constant Rate Systems
Latency Classifications
High-Latency Systems
Email-like Applications
Store-and-Forward
Strong Anonymity Guarantees
Low-Latency Systems
Real-time Communication
Interactive Applications
Weaker Anonymity Guarantees
Trade-offs Between Latency and Anonymity
The Anonymity Trilemma
Latency Requirements
Bandwidth Efficiency
Anonymity Strength
System Design Compromises
Threat Models
Local Adversary
Network Eavesdropping
Limited Observation Capabilities
Global Passive Adversary
Complete Network Observation
Traffic Correlation Capabilities
Active Adversary
Traffic Injection
Node Compromise
Protocol Manipulation
Adaptive Adversary
Learning Capabilities
Strategy Adjustment
Previous
1. Introduction to Anonymity and Privacy
Go to top
Next
3. The Tor Network Architecture