UsefulLinks
Computer Science
Cybersecurity
Tor and Anonymity Systems
1. Introduction to Anonymity and Privacy
2. Foundational Concepts of Anonymity Networks
3. The Tor Network Architecture
4. Using Tor
5. Security Analysis and Attacks
6. Defenses and Countermeasures
7. Alternative Anonymity Systems
8. Legal and Social Context
9. Future Directions and Research
2.
Foundational Concepts of Anonymity Networks
2.1.
Mix Networks
2.1.1.
Principles of Mix Networks
2.1.1.1.
Message Batching
2.1.1.2.
Traffic Mixing
2.1.1.3.
Cryptographic Protection
2.1.2.
Chaumian Mixes
2.1.2.1.
Original Mix Design
2.1.2.2.
Message Shuffling
2.1.2.3.
Delayed Forwarding
2.1.2.4.
Cryptographic Layers
2.1.3.
Mix Network Topologies
2.1.3.1.
Cascade Networks
2.1.3.2.
Free-Route Networks
2.1.3.3.
Stratified Networks
2.1.4.
Batching Strategies
2.1.4.1.
Fixed-Size Batches
2.1.4.2.
Timed Batches
2.1.4.3.
Threshold Batches
2.1.5.
Dummy Traffic
2.1.5.1.
Cover Traffic Generation
2.1.5.2.
Traffic Padding
2.1.5.3.
Constant Rate Systems
2.2.
Latency Classifications
2.2.1.
High-Latency Systems
2.2.1.1.
Email-like Applications
2.2.1.2.
Store-and-Forward
2.2.1.3.
Strong Anonymity Guarantees
2.2.2.
Low-Latency Systems
2.2.2.1.
Real-time Communication
2.2.2.2.
Interactive Applications
2.2.2.3.
Weaker Anonymity Guarantees
2.2.3.
Trade-offs Between Latency and Anonymity
2.3.
The Anonymity Trilemma
2.3.1.
Latency Requirements
2.3.2.
Bandwidth Efficiency
2.3.3.
Anonymity Strength
2.3.4.
System Design Compromises
2.4.
Threat Models
2.4.1.
Local Adversary
2.4.1.1.
Network Eavesdropping
2.4.1.2.
Limited Observation Capabilities
2.4.2.
Global Passive Adversary
2.4.2.1.
Complete Network Observation
2.4.2.2.
Traffic Correlation Capabilities
2.4.3.
Active Adversary
2.4.3.1.
Traffic Injection
2.4.3.2.
Node Compromise
2.4.3.3.
Protocol Manipulation
2.4.4.
Adaptive Adversary
2.4.4.1.
Learning Capabilities
2.4.4.2.
Strategy Adjustment
Previous
1. Introduction to Anonymity and Privacy
Go to top
Next
3. The Tor Network Architecture