Now showing items 1-2 of 2
Abusers don’t get Privacy. Sensitively Logging and Blocking Tor Abuse
Tor has a significant problem with malicious traffic routed through Tor exit nodes. They create a credible reason for websites to discriminate against Tor users. The abuse also creates a strong disincentive to run exit nodes since the exit node operators have to deal with abuse messages and possible law enforcement ...
Analyzing PeerFlow – A Bandwidth Estimation System for Untrustworthy Environments
Tor is the most popular low-latency anonymization network comprising over 7,000 nodes run by volunteers. To balance the user traffic load over the diverse resource capabilities of these nodes, Tor guides users to choose nodes in proportion to their available bandwidth. However, self-reported bandwidth values are not ...