The potential harms of the Tor anonymity network cluster disproportionately in free countries

E Jardine, AM Lindner… - Proceedings of the …, 2020 - National Acad Sciences
The Tor anonymity network allows users to protect their privacy and circumvent censorship
restrictions but also shields those distributing child abuse content, selling or buying illicit …

De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Enforced community standards for research on users of the Tor anonymity network

C Soghoian - Financial Cryptography and Data Security: FC 2011 …, 2012 - Springer
Security and privacy researchers are increasingly taking an interest in the Tor network, and
have even performed studies that involved intercepting the network communications of Tor …

The Dark Web dilemma: Tor, anonymity and online policing

E Jardine - Global Commission on Internet Governance Paper …, 2015 - papers.ssrn.com
Online anonymity-granting systems such as The Onion Router (Tor) network can be used for
both good and ill. The Dark Web is possible only because of online anonymity. The Dark …

An empirical study of the i2p anonymity network and its censorship resistance

NP Hoang, P Kintis, M Antonakakis… - Proceedings of the …, 2018 - dl.acm.org
Tor and I2P are well-known anonymity networks used by many individuals to protect their
online privacy and anonymity. Tor's centralized directory services facilitate the …

Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law

T Minárik, AM Osula - Computer Law & Security Review, 2016 - Elsevier
Tor is one of the most popular technical means of anonymising one's identity and location
online. While it has been around for more than a decade, it is only in recent years that Tor …

[PDF][PDF] Technical and legal overview of the tor anonymity network

E Çalışkan, T Minárik, AM Osula - NATO Cooperative Cyber …, 2015 - goodtimesweb.org
The Tor anonymity network keeps making the headlines. The notorious Tor Stinks
presentation, 1 as well as the Freedom Hosting2 and Silk Road 2.03 cases, are just a few …

Privacy worlds: Exploring values and design in the development of the tor anonymity network

B Collier, J Stewart - Science, Technology, & Human Values, 2022 - journals.sagepub.com
This paper explores, through empirical research, how values, engineering practices, and
technological design decisions shape one another in the development of privacy …

Tor and Circumvention: Lessons Learned: (Abstract to Go with Invited Talk)

R Dingledine - Annual Cryptology Conference, 2011 - Springer
Tor and Circumvention: Lessons Learned Page 1 Tor and Circumvention: Lessons Learned *
(Abstract to Go with Invited Talk) Roger Dingledine The Tor Project Tor is a free-software …

Understanding tor usage with privacy-preserving measurement

A Mani, T Wilson-Brown, R Jansen, A Johnson… - Proceedings of the …, 2018 - dl.acm.org
The Tor anonymity network is difficult to measure because, if not done carefully,
measurements could risk the privacy (and potentially the safety) of the network's users …