TY - GEN
T1 - Shining light in dark places
T2 - 8th Privacy Enhancing Technologies Symposium, PETS 2008
AU - McCoy, Damon
AU - Bauer, Kevin
AU - Grunwald, Dirk
AU - Kohno, Tadayoshi
AU - Sicker, Douglas
PY - 2008
Y1 - 2008
N2 - To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. We present observations and analysis obtained by participating in the Tor network. Our primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, we are interested in answering the following questions: (1) How is Tor being used? (2) How is Tor being mis-used? (3) Who is using Tor? To sample the results, we show that web traffic makes up the majority of the connections and bandwidth, but non-interactive protocols consume a disproportionately large amount of bandwidth when compared to interactive protocols. We provide a survey of how Tor is being misused, both by clients and by Tor router operators. In particular, we develop a method for detecting exit router logging (in certain cases). Finally, we present evidence that Tor is used throughout the world, but router participation is limited to only a few countries.
AB - To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. We present observations and analysis obtained by participating in the Tor network. Our primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, we are interested in answering the following questions: (1) How is Tor being used? (2) How is Tor being mis-used? (3) Who is using Tor? To sample the results, we show that web traffic makes up the majority of the connections and bandwidth, but non-interactive protocols consume a disproportionately large amount of bandwidth when compared to interactive protocols. We provide a survey of how Tor is being misused, both by clients and by Tor router operators. In particular, we develop a method for detecting exit router logging (in certain cases). Finally, we present evidence that Tor is used throughout the world, but router participation is limited to only a few countries.
UR - http://www.scopus.com/inward/record.url?scp=50249133191&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=50249133191&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-70630-4_5
DO - 10.1007/978-3-540-70630-4_5
M3 - Conference contribution
AN - SCOPUS:50249133191
SN - 3540706291
SN - 9783540706298
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 63
EP - 76
BT - Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings
Y2 - 23 July 2008 through 25 July 2008
ER -