“…Performance and deficiencies [65], [66], [67], [68], [69] 5 Changes in the design [69], [70], [71], [61], [72], [73] 6 Discovery and measurement [74], [75], [32], [33], [34], [37], [38], [68], [23], [30], [31], [19] 12…”
Section: Research Fieldmentioning
confidence: 99%
“…Other research works [33,37] are based on the discovery of Hidden Services through search engines with specific keywords that allow them to extract .onion addresses, for example, from sites on the Dark Web such as wikis or using common Surface Web search engines such as Google. Thus, Bernaschi et al in [33] emphasize that during their collection process, they only reached 25% to 35% of the total number of hidden services that Tor says are published daily.…”
Section: Discovery and Measurementmentioning
confidence: 99%
“…Thus, Bernaschi et al in [33] emphasize that during their collection process, they only reached 25% to 35% of the total number of hidden services that Tor says are published daily. Furthermore, Li et al [37] obtained 173,667 .onion addresses but only 4,857 of these were online.…”
Anonymous communications networks were born to protect the privacy of our communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features, among them, we can mention user’s IP location or Tor Hidden Services (THS) as a mechanism to conceal the location of servers, mainly, web servers. THS is an important research field in Tor. However, there is a lack of reviews that sump up main findings and research challenges. In this article we present a systematic literature review that aims to offer a comprehensive view on the research made on Tor Hidden services presenting the state of the art and the different research challenges to be addressed. This review has been developed from a selection of 57 articles and present main findings and advances regarding Tor Hidden Services, limitations found, and future issues to be investigated.
“…Performance and deficiencies [65], [66], [67], [68], [69] 5 Changes in the design [69], [70], [71], [61], [72], [73] 6 Discovery and measurement [74], [75], [32], [33], [34], [37], [38], [68], [23], [30], [31], [19] 12…”
Section: Research Fieldmentioning
confidence: 99%
“…Other research works [33,37] are based on the discovery of Hidden Services through search engines with specific keywords that allow them to extract .onion addresses, for example, from sites on the Dark Web such as wikis or using common Surface Web search engines such as Google. Thus, Bernaschi et al in [33] emphasize that during their collection process, they only reached 25% to 35% of the total number of hidden services that Tor says are published daily.…”
Section: Discovery and Measurementmentioning
confidence: 99%
“…Thus, Bernaschi et al in [33] emphasize that during their collection process, they only reached 25% to 35% of the total number of hidden services that Tor says are published daily. Furthermore, Li et al [37] obtained 173,667 .onion addresses but only 4,857 of these were online.…”
Anonymous communications networks were born to protect the privacy of our communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features, among them, we can mention user’s IP location or Tor Hidden Services (THS) as a mechanism to conceal the location of servers, mainly, web servers. THS is an important research field in Tor. However, there is a lack of reviews that sump up main findings and research challenges. In this article we present a systematic literature review that aims to offer a comprehensive view on the research made on Tor Hidden services presenting the state of the art and the different research challenges to be addressed. This review has been developed from a selection of 57 articles and present main findings and advances regarding Tor Hidden Services, limitations found, and future issues to be investigated.
“…However, if you store sensitive data, it is best to encrypt the data because it is transparent to the user. Because any user who has access to the browser can see the web storage data, this may bring security risks [9].…”
The security browsers represent the level of trust in system security. This is has led to the urgent need for an encryption process for these personal accounts on the browser page, because intruders are working to steal these accounts, in addition to trying to penetrate accounts, either for material or personal purpose. What has been worked on in this paper is made an extension layer on chrome browser used the user's key encryption. The RSA algorithm was used as it is one of the strong encryption algorithms in the current era. Where a 2048-byte encryption key was used, the aim of increasing is the strength of the encryption.Finally, this paper tested the experiments by applying the model on the experimental application and WhatsApp application
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.