Download Now Free registration required
The IP was being shown everywhere! To advertisers and other places, even from SPAM who compromised users identity. No more the author said, and developed software that would hide IP address. The authors outline a security protocol that uses resource constrained trusted hardware to facilitate anonymous IP-address blocking in anonym zing networks such as Tor. Tor allows users to access Internet services privately by using a series of Tor routers to obfuscate the route from the client to the server, thereby hiding the client's IP address from the server. The success of Tor, however, has been limited because of malicious users who misuse the network. Administrators block all known exit nodes of anonymizing networks, denying nonymous access to misbehaving and behaving users alike.
- Format: PDF
- Size: 354.6 KB