Useful Links
Computer Science
Cybersecurity
Tor and Anonymity Systems
1. Introduction to Anonymity and Privacy
2. Foundational Concepts of Anonymity Networks
3. The Tor Network Architecture
4. Using Tor
5. Security Analysis and Attacks
6. Defenses and Countermeasures
7. Alternative Anonymity Systems
8. Legal and Social Context
9. Future Directions and Research
Defenses and Countermeasures
Traffic Obfuscation
Pluggable Transports
Transport Plugin Architecture
Protocol Obfuscation
Specific Transport Protocols
obfs4
Protocol Design
Deployment
meek
Domain Fronting
CDN Utilization
Snowflake
WebRTC Proxying
Volunteer Network
FTE
Format-Transforming Encryption
Circuit-Level Defenses
Vanguards
Guard Discovery Protection
Layer 2 and Layer 3 Guards
Circuit Padding
Traffic Shaping
Timing Obfuscation
Circuit Isolation
Stream Isolation
Circuit Partitioning
Application-Level Defenses
Browser Hardening
Script Blocking
Plugin Disabling
Fingerprinting Resistance
DNS Protection
DNS over HTTPS
DNS Leak Prevention
HTTPS Enforcement
HTTPS Everywhere
Certificate Validation
Network-Level Defenses
Relay Diversity
Geographic Distribution
Autonomous System Diversity
Bandwidth Measurement
Accurate Bandwidth Reporting
Load Balancing
Directory Security
Consensus Verification
Authority Key Management
User Education
Operational Security Training
Threat Model Understanding
Safe Browsing Practices
Previous
5. Security Analysis and Attacks
Go to top
Next
7. Alternative Anonymity Systems