Tor, the popular onion-routing based anonymity network, has an outdated threat model that does not account for the increasing surveillance capabilities prevalent today. Although certain strategies, such as traffic mixing and traffic padding, are performance prohibitive when applied at scale to the entirety of an onion-routed anonymity network, the careful application of these techniques to specific types of traffic vulnerable to low-resource attack may allow dramatically improved security with a relatively small performance cost. The Tor rendezvous model, in particular, stands to gain substantially from targeted hardening against various low-resource traffic correlation attacks.
Price Jones, Rhys
Miller, Torger, "On the Design of Decentralized Anonymity Networks" (2016). Senior Independent Study Theses. Paper 7323.
Bachelor of Arts
Senior Independent Study Thesis
© Copyright 2016 Torger Miller