Abstract

The recent public disclosure of mass surveillance of electronic communication, involving powerful government authorities, has drawn the public’s attention to issues regarding Internet privacy. For almost a decade now, there have been several research efforts towards designing and deploying open-source, trustworthy, and reliable systems that ensure users’ anonymity and privacy. These systems operate by hiding the true network identity of communicating parties against eavesdropping adversaries. TOR, acronym for The Onion Router, is an example of such a system. Such systems relay the traffic of their users through an overlay of nodes that are called Onion Routers and are operated by volunteers distributed across the globe. Such systems have served well as anti-censorship and anti-surveillance tools. The implementation of TOR allows an individual to access the Dark Web, an area of the Internet said to be of a much larger magnitude than the Surface Web. The Dark Web has earned a connotation as a sort of immense black market, associated with terrorist groups, child pornography, human trafficking, sale of drugs, and conspiracies, and hacking Dark Web research has received significant national and international press coverage. However, to date, little or no research has been conducted on the illicit usage TOR usage by South Africans. To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. Observations and analysis obtained are presented by participating in the TOR network. The primary goal is to elicit TOR usage by South Africans. In particular, interest is focused in answering the following question: 1. How is TOR being used?

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.