Download Now Free registration required
Anonymous communication schemes allow their users to communicate with others while concealing who communicates with whom. Deployed anonymity schemes tend to be either high-latency - they provide strong anonymity, but are unsuitably slow for casual Internet browsing - or low-latency, aiming for anonymity against weaker adversaries, but better-suited for casual Internet browsing. The majority of these schemes forward end-user traffic though redirecting relays, using multi-layered encryption between the source and every intermediate relay to ensure both end-to-end privacy and message size unity.
- Format: PDF
- Size: 1054.1 KB