Your choice MATor(s) : large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks
anonymity quantification | Tor's path selection | Tor | Computersicherheit | rigorous guarantees | anonymous communication
acm: ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS | ComputingMilieux_COMPUTERSANDSOCIETY
In this paper, we present a rigorous methodology for quantifying the anonymity provided by Tor against a variety of structural attacks, i.e., adversaries that compromise Tor nodes and thereby perform eavesdropping attacks to deanonymize Tor users. First, we provide an a...