Next, the problems of scalability and Autonomous-System (hereafter: AS) level adversary in Tor are comprehensively analyzed with real-world data in section III. In this paper, we start by providing background on Tor’s recent design and path selection algorithm in section II. Despite the existence of many pro-privacy and anti-censorship tools that are freely available on the Internet such as proxy servers, Virtual Private Network (VPN) software and so on, The Onion Router (Tor) has been proved to be the most robust anonymous communication tool. For that reason, anonymous communication has drawn remarkable attention from both researchers and ordinary internet users as they grow to support more and more users with various applications to protect their privacy. Moreover, as recently confirmed by Edward Snowden, Autonomous System level adversary is no longer theoretical, but poses a real threat to internet users’ privacy. According to the Guardian, the NSA has a program called Marina which can track and store the online metadata of millions of internet users for up to a year, while the Britain’s GCHQ has secretly gained access to the networks of cables which transmit the world’s phone calls and internet traffic. Even in areas with a long history of freedom of speech like America and Western Countries, the government surveillance activities are happening day to day. recent years, the problems of censorship and surveillance in cyberspace have become more and more serious.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |