2013
DOI: 10.1016/j.comcom.2013.04.009
|View full text |Cite
|
Sign up to set email alerts
|

An overview of anonymity technology usage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(23 citation statements)
references
References 25 publications
0
22
0
Order By: Relevance
“…Besides papers focused on circumvention itself, often papers discussing censorship and censorship detection add also the related analysis of possible circumvention methods; e.g., in the early analysis of networkbased censorship techniques Dornseif [48] cites and discusses a number of possible circumvention techniques, concluding that they are not easy to be applied for a common user; in [31] a technique is presented to circumvent a specific censorship (TCP-RST communication disruption) by identifying and ignoring the forged RST packets; a few techniques for circumvention of application-level keyword-based censorship are suggested by Crandall et al [33]. Even if not specifically designed for censorship circumvention, anonymity technologies can and have been used to circumvent censorship: a recent survey on usage of several technologies including proxy servers, remailers, overlay networks such as JAP (Köpsell et al [92]), I2P (Schomburg [135]), and Tor (Dingledine et al [46]) is provided by Li et al [102]. 4 Specifically dealing with web browsing activities, a survey on "privacy enhancing" tools is presented by Ruiz-Martínez [133].…”
Section: Network-based Censorshipmentioning
confidence: 98%
“…Besides papers focused on circumvention itself, often papers discussing censorship and censorship detection add also the related analysis of possible circumvention methods; e.g., in the early analysis of networkbased censorship techniques Dornseif [48] cites and discusses a number of possible circumvention techniques, concluding that they are not easy to be applied for a common user; in [31] a technique is presented to circumvent a specific censorship (TCP-RST communication disruption) by identifying and ignoring the forged RST packets; a few techniques for circumvention of application-level keyword-based censorship are suggested by Crandall et al [33]. Even if not specifically designed for censorship circumvention, anonymity technologies can and have been used to circumvent censorship: a recent survey on usage of several technologies including proxy servers, remailers, overlay networks such as JAP (Köpsell et al [92]), I2P (Schomburg [135]), and Tor (Dingledine et al [46]) is provided by Li et al [102]. 4 Specifically dealing with web browsing activities, a survey on "privacy enhancing" tools is presented by Ruiz-Martínez [133].…”
Section: Network-based Censorshipmentioning
confidence: 98%
“…Before data is sent through the Tor network of random relays, a layer of encryption is added for every relay in the route, which are removed per step, 'peeled off', hence the onion metaphor, leading to an unencrypted plaintext message at the point of arrival (Reed, Syverson & Goldschlag, 1998). An exit node, the last relay in the chain before the receiver of the message, can thus observe the content of messages if they are not encrypted by the user, but will not see the source of the message (Li et al, 2013). The technical workings of Tor are visualised in the graph below.…”
Section: Dns Leaksmentioning
confidence: 99%
“…It may raise security problems, too [1]. In other words, attackers can use it to hide their anonymity as well!…”
Section: Introductionmentioning
confidence: 97%
“…However, today proxies are used also to meet the need for anonymous web surfing [1]. Users can anonymously surf the web without revealing their own IP (Internet Protocol) addresses by using a proxy server as a stepping-stone.…”
Section: Introductionmentioning
confidence: 99%