Download now Free registration required
To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. The authors present observations and analysis obtained by participating in the Tor network. Their primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, they are interested in answering the following questions: How is Tor being used? How is Tor being mis-used? Who is using Tor? To sample the results, they show that web traffic makes up the majority of the connections and bandwidth, but non-interactive protocols consume a disproportionately large amount of bandwidth when compared to interactive protocols.
- Format: PDF
- Size: 528.97 KB