Useful Links
Computer Science
Cybersecurity
Tor and Anonymity Systems
1. Introduction to Anonymity and Privacy
2. Foundational Concepts of Anonymity Networks
3. The Tor Network Architecture
4. Using Tor
5. Security Analysis and Attacks
6. Defenses and Countermeasures
7. Alternative Anonymity Systems
8. Legal and Social Context
9. Future Directions and Research
Security Analysis and Attacks
Traffic Analysis Attacks
End-to-End Correlation
Timing Correlation
Volume Correlation
Pattern Matching
Website Fingerprinting
Traffic Pattern Analysis
Machine Learning Approaches
Defense Mechanisms
Circuit Fingerprinting
Circuit Construction Patterns
Relay Selection Fingerprinting
Node-Level Attacks
Exit Node Attacks
Traffic Sniffing
Content Modification
SSL Stripping
Malicious Exit Behavior
Guard Node Attacks
Guard Discovery
Guard Enumeration
Long-term Observation
Relay Compromise
Malicious Relay Operation
Key Extraction
Traffic Manipulation
Network-Level Attacks
Sybil Attacks
Relay Network Infiltration
Path Selection Manipulation
Consensus Manipulation
Eclipse Attacks
Network Partitioning
Information Control
Denial of Service
Circuit-Level DoS
Relay-Level DoS
Network-Wide DoS
Protocol Vulnerabilities
Directory System Attacks
Directory Authority Compromise
Consensus Poisoning
Bandwidth Manipulation
Circuit-Level Vulnerabilities
Circuit Hijacking
Circuit Correlation
Cell-Level Attacks
Cell Counting
Cell Timing
Application-Level Attacks
Browser Exploitation
JavaScript Attacks
Plugin Vulnerabilities
Browser Fingerprinting
DNS Leaks
DNS Query Exposure
DNS Cache Poisoning
Time Zone Leaks
Plugin-Based Attacks
User Behavior Attacks
Operational Security Failures
Identity Correlation
Behavioral Patterns
Information Disclosure
Social Engineering
Cross-Protocol Attacks
Previous
4. Using Tor
Go to top
Next
6. Defenses and Countermeasures