Useful Links
Computer Science
Cybersecurity
Tor and Anonymity Systems
1. Introduction to Anonymity and Privacy
2. Foundational Concepts of Anonymity Networks
3. The Tor Network Architecture
4. Using Tor
5. Security Analysis and Attacks
6. Defenses and Countermeasures
7. Alternative Anonymity Systems
8. Legal and Social Context
9. Future Directions and Research
Alternative Anonymity Systems
I2P
Garlic Routing
Message Bundling
Layered Encryption
ElGamal Encryption
Network Architecture
Distributed Hash Table
Tunnel Management
Router Selection
Tunnel System
Inbound Tunnels
Outbound Tunnels
Tunnel Building
Applications
Eepsites
Peer-to-Peer Applications
Anonymous Email
Comparison with Tor
Performance Characteristics
Anonymity Properties
Use Case Differences
Freenet
Design Philosophy
Censorship Resistance
Distributed Storage
Plausible Deniability
Network Modes
Darknet Mode
Friend-to-Friend Connections
Trust Networks
Opennet Mode
Stranger Connections
Automatic Peering
Data Storage
Content Hash Keys
Signed Subspace Keys
Keyword-Signed Keys
Routing Algorithm
Small World Routing
Location-Based Routing
JAP/JonDonym
Mix Cascade Architecture
Commercial Anonymity Service
Legal Framework
Mixminion
High-Latency Mix Network
Email Anonymity
Reply Block System
Virtual Private Networks
VPN Architecture
Tunneling Protocols
Encryption Methods
Anonymity Limitations
Single Point of Trust
Logging Policies
Legal Jurisdiction
VPN vs Tor Comparison
Threat Model Differences
Performance Trade-offs
Use Case Suitability
Previous
6. Defenses and Countermeasures
Go to top
Next
8. Legal and Social Context