首页> 外文OA文献 >The fifteen year struggle of decentralizing privacy-enhancing technology
【2h】

The fifteen year struggle of decentralizing privacy-enhancing technology

机译:分散隐私增强技术的十五年斗争

摘要

Ever since the introduction of the internet, it has been void of any privacy.The majority of internet traffic currently is and always has been unencrypted.A number of anonymous communication overlay networks exist whose aim it is toprovide privacy to its users. However, due to the nature of the internet, thereis major difficulty in getting these networks to become both decentralized andanonymous. We list reasons for having anonymous networks, discern the problemsin achieving decentralization and sum up the biggest initiatives in the fieldand their current status. To do so, we use one exemplary network, the Tornetwork. We explain how Tor works, what vulnerabilities this network currentlyhas, and possible attacks that could be used to violate privacy and anonymity.The Tor network is used as a key comparison network in the main part of thereport: a tabular overview of the major anonymous networking technologies inuse today.
机译:自从Internet引入以来,它就没有任何隐私可言。目前,大多数Internet流量一直并且一直是未加密的。存在许多旨在向用户提供隐私的匿名通信覆盖网络。然而,由于互联网的性质,使这些网络变得分散和匿名化存在很大的困难。我们列举了建立匿名网络的原因,辨别实现权力下放的问题,并总结了该领域最大的倡议及其现状。为此,我们使用一个示例性网络,即Tornetwork。我们解释了Tor的工作原理,该网络当前存在的漏洞以及可能用于侵犯隐私和匿名性的攻击.Tor网络在报告的主要部分用作关键比较网络:主要匿名网络的表格概述今天使用的技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号