Abstract
Tor, the popular onion-routing based anonymity network, has an outdated threat model that does not account for the increasing surveillance capabilities prevalent today. Although certain strategies, such as traffic mixing and traffic padding, are performance prohibitive when applied at scale to the entirety of an onion-routed anonymity network, the careful application of these techniques to specific types of traffic vulnerable to low-resource attack may allow dramatically improved security with a relatively small performance cost. The Tor rendezvous model, in particular, stands to gain substantially from targeted hardening against various low-resource traffic correlation attacks.
Advisor
Price Jones, Rhys
Department
Computer Science
Recommended Citation
Miller, Torger, "On the Design of Decentralized Anonymity Networks" (2016). Senior Independent Study Theses. Paper 7323.
https://openworks.wooster.edu/independentstudy/7323
Publication Date
2016
Degree Granted
Bachelor of Arts
Document Type
Senior Independent Study Thesis
© Copyright 2016 Torger Miller