Tor, the popular onion-routing based anonymity network, has an outdated threat model that does not account for the increasing surveillance capabilities prevalent today. Although certain strategies, such as traffic mixing and traffic padding, are performance prohibitive when applied at scale to the entirety of an onion-routed anonymity network, the careful application of these techniques to specific types of traffic vulnerable to low-resource attack may allow dramatically improved security with a relatively small performance cost. The Tor rendezvous model, in particular, stands to gain substantially from targeted hardening against various low-resource traffic correlation attacks.


Price Jones, Rhys


Computer Science

Publication Date


Degree Granted

Bachelor of Arts

Document Type

Senior Independent Study Thesis



© Copyright 2016 Torger Miller