[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] PaperDump: Mirai, Tor, Darknet, TLA, I2P Censorship, PETs in Sidechains, and more
- To: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Subject: [tor-talk] PaperDump: Mirai, Tor, Darknet, TLA, I2P Censorship, PETs in Sidechains, and more
- From: grarpamp <grarpamp@xxxxxxxxx>
- Date: Wed, 28 Aug 2019 07:11:08 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Wed, 28 Aug 2019 07:11:23 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=t4+zPsXPVk8MUCzZpYrpoKZuQxMG0SkOQPfxjyOKhXw=; b=Uy6eFOp9njcqURmuzfTFiXmik52+5Jr/JFk9NjNXMqKlm1o6UzRWP/+Kps0QQI9ZHj VRRXBT8ZWE4BcEFYb+VTfpwPTcpI4lHPL7AdpswcPqm8T9f9/2cIXiaegYnRHxRK+QWs vmIT2/4uu5VECltQIK3cwLyurv3a56i2lAPWmG3m1qDJzJ7hjd0PMEUWDimbs8B6ErwM ivcJA1wmL4CeigpLxkErpnA70XL0s+St54jo5ISqY6fh+A4NLOEG6Pc34z9eCz68Ol+f v66UsJbJDXgrLELQ00ufwbeV5GKIE2eJ3KmVa9+TvE1MfsQcqdQZH0nDiliJfV/LS5GK m9iQ==
- List-archive: <http://lists.torproject.org/pipermail/tor-talk/>
- List-help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
- List-id: "all discussion about theory, design, and development of Onion Routing" <tor-talk.lists.torproject.org>
- List-post: <mailto:tor-talk@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
- Reply-to: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-talk" <tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx>
https://news.softpedia.com/news/mozilla-firefox-could-soon-get-a-tor-mode-add-on-526774.shtml
https://www.zdnet.com/article/new-mirai-botnet-lurks-in-the-tor-network-to-stay-under-the-radar/
OSINT Analysis of the TOR Foundation
https://arxiv.org/pdf/1803.05201.pdf
Tempest: Temporal Dynamics in Anonymity Systems
https://arxiv.org/pdf/1801.01932.pdf
Adversaries monitoring Tor traffic crossing their jurisdictional
border and reconstructing Tor circuits
https://arxiv.org/pdf/1808.09237.pdf
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
https://arxiv.org/pdf/1808.07285.pdf
Onions in the Crosshairs: When The Man really is out to get you
https://arxiv.org/pdf/1706.10292.pdf
Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research
https://arxiv.org/pdf/1803.02816.pdf
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
https://arxiv.org/pdf/1808.01155.pdf
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
https://arxiv.org/pdf/1704.00843.pdf
Peel the onion: Recognition of Android apps behind the Tor Network
https://arxiv.org/pdf/1901.04434.pdf
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
https://arxiv.org/pdf/1902.06421.pdf
Mockingbird: Defending Against Deep-Learning-Based Website
Fingerprinting Attacks with Adversarial Traces
https://arxiv.org/pdf/1902.06626.pdf
A Forensic Audit of the Tor Browser Bundle
https://arxiv.org/pdf/1907.10279.pdf
Anomalous keys in Tor relays
https://arxiv.org/pdf/1704.00792.pdf
Mitigating Censorship with Multi-Circuit Tor and Linear Network Coding
https://arxiv.org/pdf/1907.03473.pdf
DNS-Morph: UDP-Based Bootstrapping Protocol For Tor
https://arxiv.org/pdf/1904.01240.pdf
Towards Predicting Efficient and Anonymous Tor Circuits
https://arxiv.org/pdf/1805.01977.pdf
TorPolice: Towards Enforcing Service-Defined Access Policies in
Anonymous Systems
https://arxiv.org/pdf/1708.08162.pdf
DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback
https://arxiv.org/pdf/1705.09460.pdf
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
https://arxiv.org/pdf/1801.07501.pdf
Tor Users Contributing to Wikipedia: Just Like Everybody Else?
https://arxiv.org/pdf/1904.04324.pdf
Open Dataset of Phishing and Tor Hidden Services Screen-captures
https://arxiv.org/pdf/1908.02449.pdf
A Broad Evaluation of the Tor English Content Ecosystem
https://arxiv.org/pdf/1902.06680.pdf
Structure and Content of the Visible Darknet
https://arxiv.org/pdf/1811.01348.pdf
On the Complexity of Anonymous Communication Through Public Networks
https://arxiv.org/pdf/1902.06306.pdf
A Survey of Privacy Infrastructures and Their Vulnerabilities
https://arxiv.org/pdf/1812.06226.pdf
The Effectiveness of Privacy Enhancing Technologies against Fingerprinting
https://arxiv.org/pdf/1812.03920.pdf
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
https://arxiv.org/pdf/1808.01708.pdf
An Extensive Evaluation of the Internet's Open Proxies
https://arxiv.org/pdf/1806.10258.pdf
Measuring I2P Censorship at a Global Scale
https://arxiv.org/pdf/1907.07120.pdf
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
https://arxiv.org/pdf/1809.09086.pdf
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains
https://arxiv.org/pdf/1906.04953.pdf
BlockTag: Design and applications of a tagging system for blockchain analysis
https://arxiv.org/pdf/1809.06044.pdf
Interesting that many attacks on overlay networks
seem to depend on lack of fulltime 100% capacity fill
and reclocking, and that no overlay [or underlying physical]
networks currently deploy it, nor do many nets
of other design seem to make extensive impact
upon that class of GPA. Even 14.4-56k rates could
could have interesting uses at secure levels.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
- Prev by Author:
Re: [tor-talk] PaperDump: Mirai, Tor, Darknet, TLA, I2P Censorship, PETs in Sidechains, and more
- Next by Author:
[tor-talk] Privacy, Censorship, Freedom
- Previous by thread:
[tor-talk] Privacy, Censorship, Freedom
- Next by thread:
Re: [tor-talk] PaperDump: Mirai, Tor, Darknet, TLA, I2P Censorship, PETs in Sidechains, and more
- Index(es):