Download now Free registration required
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by "Local" adversaries who control only a few machines and have low enough delay to support anonymous use of network services like Web browsing and remote login. One consequence of these goals is that these services leak some information about the network latency between the sender and one or more nodes in the system. The authors present two attacks on low-latency anonymity schemes using this information.
- Format: PDF
- Size: 3817.1 KB