Shining Light in Dark Places: Understanding the Tor Network

Author(s):  
Damon McCoy ◽  
Kevin Bauer ◽  
Dirk Grunwald ◽  
Tadayoshi Kohno ◽  
Douglas Sicker
Keyword(s):  
Author(s):  
Sergio Mauricio Martinez Monterrubio ◽  
Joseph Eduardo Armas Naranjo ◽  
Lorena Isabel Barona Lopez ◽  
Angel Leonardo Valdivieso Caraguay
Keyword(s):  

Author(s):  
Felix Fiedler ◽  
Christoph Dopmann ◽  
Florian Tschorsch ◽  
Sergio Lucia

2020 ◽  
Vol 117 (50) ◽  
pp. 31716-31721
Author(s):  
Eric Jardine ◽  
Andrew M. Lindner ◽  
Gareth Owenson

The Tor anonymity network allows users to protect their privacy and circumvent censorship restrictions but also shields those distributing child abuse content, selling or buying illicit drugs, or sharing malware online. Using data collected from Tor entry nodes, we provide an estimation of the proportion of Tor network users that likely employ the network in putatively good or bad ways. Overall, on an average country/day, ∼6.7% of Tor network users connect to Onion/Hidden Services that are disproportionately used for illicit purposes. We also show that the likely balance of beneficial and malicious use of Tor is unevenly spread globally and systematically varies based upon a country’s political conditions. In particular, using Freedom House’s coding and terminological classifications, the proportion of often illicit Onion/Hidden Services use is more prevalent (∼7.8%) in “free” countries than in either “partially free” (∼6.7%) or “not free” regimes (∼4.8%).


2017 ◽  
Vol 2017 (1) ◽  
pp. 21-41 ◽  
Author(s):  
Jesse Victors ◽  
Ming Li ◽  
Xinwen Fu

Abstract Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-unique verifiable domain name chosen by the onion service administrator.We construct OnioNS as an optional backwards-compatible plugin for Tor, simplify our design and threat model by embedding OnioNS within the Tor network, and provide mechanisms for authenticated denial-of-existence with minimal networking costs. We introduce a lottery-like system to reduce the threat of land rushes and domain squatting. Finally, we provide a security analysis, integrate our software with the Tor Browser, and conduct performance tests of our prototype.


2018 ◽  
Vol 108 (1) ◽  
pp. 45-68 ◽  
Author(s):  
Diana S. Dolliver ◽  
Steven P. Ericson ◽  
Katherine L. Love

Author(s):  
Felix W. Baumann ◽  
Ulrich Odefey ◽  
Sebastian Hudert ◽  
Michael Falkenthal ◽  
Uwe Breitenbücher
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document