当前位置: X-MOL 学术IEEE Secur. Priv. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Investigative Techniques for the De-Anonymization of Hidden Services
IEEE Security & Privacy ( IF 1.9 ) Pub Date : 2021-03-22 , DOI: 10.1109/msec.2021.3050245
Marco Simioni 1
Affiliation  

Anonymity networks, also referred to as anonymous networks or darknets are an example of privacy-enhancing technology, the historical goal of which is to avoid censorship, preserve user privacy, and promote freedom of speech. The Tor network, undoubtedly the most popular anonymization technology at the time of this writing, according to its website, has several categories of users: individuals who wish to safeguard their online activity, businesses wanting to keep data confidential or conducting competitive analysis, journalists willing to protect anonymous sources and sensitive research, and activists who want to report abuses from danger zones.

中文翻译:

隐藏服务去匿名化的调查技术

匿名网络(也称为匿名网络或暗网)是增强隐私技术的一个示例,其历史目标是避免审查制度,保留用户隐私并促进言论自由。根据其网站,Tor网络无疑是在撰写本文时最受欢迎的匿名化技术,它具有以下几类用户:希望保护其在线活动的个人,希望对数据保密或进行竞争分析的企业,记者愿意保护匿名消息来源和敏感研究,以及想要举报危险区域的滥用行为的积极分子。
更新日期:2021-03-23
down
wechat
bug