GSTDTAP  > 气候变化
Past, Present and Future of Tor Hidden Services
Müller, Konstantin
2015
出版年2015
语种英语
国家挪威
领域气候变化
英文摘要Using the Internet reveals the IP addresses of both communication parties to everybody, who is able to observe the communication. Anonymity systems like Tor hide the IP addresses and the communication in such a way that the communication cannot be linked between the two parties. Tor is a low-latency anonymity network designed for interactive applications, which allows its users to stay anonymous while using the Internet, for example for Web browsing, e-mail or instant messaging. In order to achieve anonymity the users’ traffic is routed through the Tor network by choosing three random network nodes. Thus, the user stays anonymous, because his real IP address is not used to access the service and no single node in the network can link the user to the service he is accessing. In addition, Tor provides location-hidden services to allow services to operate anonymous as well. With location-hidden services the location of a service, i.e. its IP address, is not revealed by using the service. At the moment the Tor Project works on an overhaul of the design of location-hidden services. This paper introduces Tor, explains its design and specification with the goal to understand, how Tor is working to achieve its anonymity goals. It explains why Tor is built in the way as it is implemented today, but also states Tor’s limitations and situations in which Tor cannot guarantee anonymity. Furthermore, location-hidden services are introduced as well. The current hidden services design is examined in-depth with its shortcomings and drawbacks and it is presented why this design needs to be renewed. This gives a rationale for a new design of hidden services. The proposed new design is described as well. The paper finishes with a summary of open research questions, which are not yet addressed by the new hidden services design. The goal of this paper is to provide the reader with a thorough understanding of Tor and its location-hidden services. It goes beyond most introductions of Tor as it looks into Tor’s protocol specifications and explains the choices made by the designers and developers of Tor. After reading this paper the reader should be able explain, how Tor is built, why it is implemented this way, but also what Tor’s limitations are regarding anonymity and what aspects of Tor are not yet well understood. The focus of this paper is laid on the main Tor application and anonymity. It does not consider application-level issues such as the Tor Browser or the usage of Tor as a censorship circumvention tool.
英文关键词VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424
URL查看原文
来源平台Center for International Climate and Environmental Research-Oslo (CICERO)
文献类型科技报告
条目标识符http://119.78.100.173/C666/handle/2XK7JSWQ/2114
专题气候变化
推荐引用方式
GB/T 7714
Müller, Konstantin. Past, Present and Future of Tor Hidden Services,2015.
条目包含的文件
条目无相关文件。
个性服务
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Müller, Konstantin]的文章
百度学术
百度学术中相似的文章
[Müller, Konstantin]的文章
必应学术
必应学术中相似的文章
[Müller, Konstantin]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。