Tor and Anonymity Systems

  1. Alternative Anonymity Systems
    1. I2P
      1. Garlic Routing
        1. Message Bundling
          1. Layered Encryption
            1. ElGamal Encryption
            2. Network Architecture
              1. Distributed Hash Table
                1. Tunnel Management
                  1. Router Selection
                  2. Tunnel System
                    1. Inbound Tunnels
                      1. Outbound Tunnels
                        1. Tunnel Building
                        2. Applications
                          1. Eepsites
                            1. Peer-to-Peer Applications
                              1. Anonymous Email
                              2. Comparison with Tor
                                1. Performance Characteristics
                                  1. Anonymity Properties
                                    1. Use Case Differences
                                  2. Freenet
                                    1. Design Philosophy
                                      1. Censorship Resistance
                                        1. Distributed Storage
                                          1. Plausible Deniability
                                          2. Network Modes
                                            1. Darknet Mode
                                              1. Friend-to-Friend Connections
                                                1. Trust Networks
                                                2. Opennet Mode
                                                  1. Stranger Connections
                                                    1. Automatic Peering
                                                  2. Data Storage
                                                    1. Content Hash Keys
                                                      1. Signed Subspace Keys
                                                        1. Keyword-Signed Keys
                                                        2. Routing Algorithm
                                                          1. Small World Routing
                                                            1. Location-Based Routing
                                                          2. JAP/JonDonym
                                                            1. Mix Cascade Architecture
                                                              1. Commercial Anonymity Service
                                                              2. Mixminion
                                                                1. High-Latency Mix Network
                                                                  1. Email Anonymity
                                                                    1. Reply Block System
                                                                    2. Virtual Private Networks
                                                                      1. VPN Architecture
                                                                        1. Tunneling Protocols
                                                                          1. Encryption Methods
                                                                          2. Anonymity Limitations
                                                                            1. Single Point of Trust
                                                                              1. Logging Policies
                                                                              2. VPN vs Tor Comparison
                                                                                1. Threat Model Differences
                                                                                  1. Performance Trade-offs
                                                                                    1. Use Case Suitability