A Critique of Website Traffic Fingerprinting Attacks
Website traffic fingerprinting is an attack where the adversary attempts to recognize the...
Website traffic fingerprinting is an attack where the adversary attempts to recognize the...
There are tensions in the Tor protocol design between the anonymity provided by entry guards and...
Many people set up new fast relays and then wonder why their bandwidth is not fully loaded...
Hidden Services are in a peculiar situation. While they see a loyal fan-base, there are no...
The 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI '13) has put out a...
In October I attended WPES and the first day of CCS. There are a bunch of new Tor-related...
This is part 2 of Nick Mathewson and Steven Murdoch's series on what has changed in Tor's design...
The main academic reference for Tor is "Tor: The Second-Generation Onion Router" by Dingledine,...
In the summer of 2011, I spent a few months learning how to effectively reverse engineer Windows...
The 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI '12) seeks to...