2019
DOI: 10.4018/ijsssp.2019070102
|View full text |Cite
|
Sign up to set email alerts
|

TLS Certificates of the Tor Network and Their Distinctive Features

Abstract: This article presents the results of an experimental study of the properties of SSL/TLS certificates of an anonymous Tor network, based on which it is concluded that there are several features that differ from other SSL/TLS certificates. At present, in the scientific literature and in the documentation of U.S. National Security Agency, and the U.K. Government Communications Headquarters devoted to the identification of Tor network traffic, two signs of SSL/TLS certificates are indicated - the name of the certi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Tor network anonymity is built on three encrypted layers that make tracking a user's activity difficult by forwarding the traffic through a chain of routers. Generally, traffic is transferred via three types of nodes: Access Router (AR), Intermediate Router (IR), and Exit Router (ER) [21].…”
Section: A Tor Networkmentioning
confidence: 99%
“…Tor network anonymity is built on three encrypted layers that make tracking a user's activity difficult by forwarding the traffic through a chain of routers. Generally, traffic is transferred via three types of nodes: Access Router (AR), Intermediate Router (IR), and Exit Router (ER) [21].…”
Section: A Tor Networkmentioning
confidence: 99%