Abusing privacy infrastructures: case study of Tor.

In the last two decades, advances in privacy-enhancing technologies, including cryptographic mechanisms, standardized security protocols, and infrastructures, have significantly improved the privacy of users. Tor, a byproduct of those primitives, emerged as a practical solution to protecting the pri...

Full description

Bibliographic Details
Published:
Online Access:http://hdl.handle.net/2047/D20283799
id ndltd-NEU--neu-cj82r932h
record_format oai_dc
spelling ndltd-NEU--neu-cj82r932h2021-04-13T05:14:05ZAbusing privacy infrastructures: case study of Tor.In the last two decades, advances in privacy-enhancing technologies, including cryptographic mechanisms, standardized security protocols, and infrastructures, have significantly improved the privacy of users. Tor, a byproduct of those primitives, emerged as a practical solution to protecting the privacy of citizens against censorship and tracking. At the same time, Tor's success encouraged illegal activities, including sophisticated botnets, ransomware, and a marketplace for drugs and contraband. The goal of this thesis is to provide mechanisms that will make detection of abusers of this valuable infrastructure possible.http://hdl.handle.net/2047/D20283799
collection NDLTD
sources NDLTD
description In the last two decades, advances in privacy-enhancing technologies, including cryptographic mechanisms, standardized security protocols, and infrastructures, have significantly improved the privacy of users. Tor, a byproduct of those primitives, emerged as a practical solution to protecting the privacy of citizens against censorship and tracking. At the same time, Tor's success encouraged illegal activities, including sophisticated botnets, ransomware, and a marketplace for drugs and contraband. The goal of this thesis is to provide mechanisms that will make detection of abusers of this valuable infrastructure possible.
title Abusing privacy infrastructures: case study of Tor.
spellingShingle Abusing privacy infrastructures: case study of Tor.
title_short Abusing privacy infrastructures: case study of Tor.
title_full Abusing privacy infrastructures: case study of Tor.
title_fullStr Abusing privacy infrastructures: case study of Tor.
title_full_unstemmed Abusing privacy infrastructures: case study of Tor.
title_sort abusing privacy infrastructures: case study of tor.
publishDate
url http://hdl.handle.net/2047/D20283799
_version_ 1719395723865227264