Networking Investigate

Shining Light in Dark Places: Understanding the Tor Network

Download now Free registration required

Executive Summary

To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. The authors present observations and analysis obtained by participating in the Tor network. Their primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, they are interested in answering the following questions: How is Tor being used? How is Tor being mis-used? Who is using Tor? To sample the results, they show that web traffic makes up the majority of the connections and bandwidth, but non-interactive protocols consume a disproportionately large amount of bandwidth when compared to interactive protocols.

  • Format: PDF
  • Size: 528.97 KB