Useful Links
Computer Science
Cybersecurity
Tor and Anonymity Systems
1. Introduction to Anonymity and Privacy
2. Foundational Concepts of Anonymity Networks
3. The Tor Network Architecture
4. Using Tor
5. Security Analysis and Attacks
6. Defenses and Countermeasures
7. Alternative Anonymity Systems
8. Legal and Social Context
9. Future Directions and Research
The Tor Network Architecture
Onion Routing Principles
Layered Encryption
Nested Encryption Layers
Peeling the Onion
Source Routing
Path Pre-selection
Route Establishment
Forward Secrecy
Ephemeral Keys
Perfect Forward Secrecy
Network Components
Tor Clients
Onion Proxy
SOCKS Interface
Circuit Management
Relay Types
Guard Relays
Entry Point Function
Guard Selection Algorithm
Guard Rotation
Middle Relays
Traffic Forwarding
Relay Selection
Exit Relays
Internet Gateway
Exit Policies
Exit Relay Risks
Bridge Relays
Censorship Circumvention
Bridge Distribution
Pluggable Transports
Directory System
Directory Authorities
Consensus Generation
Relay Verification
Network Status
Directory Mirrors
Bandwidth Measurement
Circuit Construction
Three-Hop Circuits
Path Length Rationale
Security Properties
Circuit Building Process
Incremental Path Extension
Key Exchange Protocol
Circuit Establishment
Path Selection Algorithm
Relay Selection Criteria
Bandwidth Weighting
Geographic Diversity
Family Restrictions
Circuit Management
Circuit Lifetime
Circuit Rotation
Circuit Failure Handling
Data Transmission
Cell Structure
Fixed-Size Cells
Cell Types
Cell Headers
Encryption Layers
Hop-by-Hop Encryption
Layer Removal Process
Stream Multiplexing
Multiple Streams per Circuit
Stream Isolation
Flow Control
Circuit-Level Flow Control
Stream-Level Flow Control
Previous
2. Foundational Concepts of Anonymity Networks
Go to top
Next
4. Using Tor