Papers
Topics
Authors
Recent
Search
2000 character limit reached

Tails & Tor and other tools for Safeguarding Online Activities

Published 24 Oct 2017 in cs.CR and cs.OS | (1710.08705v1)

Abstract: There are not many known ways to break Tor anonymity, and they require an enormous amount of computational power. Controlling both entrance and exit nodes allows an attacker to compromise client IP with enough pattern analysis. If an .onion or public website does not use SSL, information will not be encrypted once it reaches the exit node. Tor has been successfully broken by Carnegie Mellon, however they will not answer questions nor confirm their method. This research paper investigates Tails & Tor and other tools for Safeguarding Online Activities.

Citations (2)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.