Abstract

PurposeIt is increasingly difficult to ignore the importance of anonymity on the internet. Tor has been proposed as a reliable way to keep our identity secret from governments and organizations. This research evaluates its ability to protect our activity on the Web.Design/methodology/approachUsing traffic analysis over ACK packets among others, fingerprints of websites can be created and later on used to recognise Tor traffic.FindingsTor does not add enough entropy to HTTP traffic, which allows us to recognise the access to static websites without breaking Tor's cryptography.Research limitations/implicationsThis work shows that the method presented behaves well with a limited set of fingerprints. Further research should be performed on its reliability with larger sets.Social implicationsTor has been used by political dissidents and citizens in countries without freedom of speech to access banned websites such as Twitter or Facebook. This paper shows that it might be possible for their countries to know what they have done.Originality/valueThis paper shows that while Tor does a good work keeping the content of our communication, it is weak protecting the identity of the website being accessed.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.