Abstract- This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how vulnerable Tor users are to sophisticated de-anonymization attacks: up to 78 % of the Tor users do not use Tor as suggested […]
Category: tor
Our publications have been accepted at the IFIP CMS’2010 and the SEC 2010 conference. I will publish preprints soon.