UsefulLinks
Computer Science
Cybersecurity
Tor and Anonymity Systems
1. Introduction to Anonymity and Privacy
2. Foundational Concepts of Anonymity Networks
3. The Tor Network Architecture
4. Using Tor
5. Security Analysis and Attacks
6. Defenses and Countermeasures
7. Alternative Anonymity Systems
8. Legal and Social Context
9. Future Directions and Research
7.
Alternative Anonymity Systems
7.1.
I2P
7.1.1.
Garlic Routing
7.1.1.1.
Message Bundling
7.1.1.2.
Layered Encryption
7.1.1.3.
ElGamal Encryption
7.1.2.
Network Architecture
7.1.2.1.
Distributed Hash Table
7.1.2.2.
Tunnel Management
7.1.2.3.
Router Selection
7.1.3.
Tunnel System
7.1.3.1.
Inbound Tunnels
7.1.3.2.
Outbound Tunnels
7.1.3.3.
Tunnel Building
7.1.4.
Applications
7.1.4.1.
Eepsites
7.1.4.2.
Peer-to-Peer Applications
7.1.4.3.
Anonymous Email
7.1.5.
Comparison with Tor
7.1.5.1.
Performance Characteristics
7.1.5.2.
Anonymity Properties
7.1.5.3.
Use Case Differences
7.2.
Freenet
7.2.1.
Design Philosophy
7.2.1.1.
Censorship Resistance
7.2.1.2.
Distributed Storage
7.2.1.3.
Plausible Deniability
7.2.2.
Network Modes
7.2.2.1.
Darknet Mode
7.2.2.1.1.
Friend-to-Friend Connections
7.2.2.1.2.
Trust Networks
7.2.2.2.
Opennet Mode
7.2.2.2.1.
Stranger Connections
7.2.2.2.2.
Automatic Peering
7.2.3.
Data Storage
7.2.3.1.
Content Hash Keys
7.2.3.2.
Signed Subspace Keys
7.2.3.3.
Keyword-Signed Keys
7.2.4.
Routing Algorithm
7.2.4.1.
Small World Routing
7.2.4.2.
Location-Based Routing
7.3.
JAP/JonDonym
7.3.1.
Mix Cascade Architecture
7.3.2.
Commercial Anonymity Service
7.3.3.
Legal Framework
7.4.
Mixminion
7.4.1.
High-Latency Mix Network
7.4.2.
Email Anonymity
7.4.3.
Reply Block System
7.5.
Virtual Private Networks
7.5.1.
VPN Architecture
7.5.1.1.
Tunneling Protocols
7.5.1.2.
Encryption Methods
7.5.2.
Anonymity Limitations
7.5.2.1.
Single Point of Trust
7.5.2.2.
Logging Policies
7.5.2.3.
Legal Jurisdiction
7.5.3.
VPN vs Tor Comparison
7.5.3.1.
Threat Model Differences
7.5.3.2.
Performance Trade-offs
7.5.3.3.
Use Case Suitability
Previous
6. Defenses and Countermeasures
Go to top
Next
8. Legal and Social Context