Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 20 October 2019

Practical Vulnerabilities of the Tor Anonymity Network

Practical Vulnerabilities of the Tor Anonymity Network

Chapter:
(p.60) Practical Vulnerabilities of the Tor Anonymity Network
Source:
Advances in Cyber Security
Author(s):

Paul Syverson

Publisher:
Fordham University Press
DOI:10.5422/fordham/9780823244560.003.0002

Onion routing is a technology designed at the U.S. Naval Research Laboratory to protect the security and privacy of network communications. In particular, Tor, the current widely used onion routing system, was originally designed to protect intelligence gathering from open sources and to otherwise protect military communications over insecure or public networks, but it is also used by human rights workers, law enforcement officers, abuse victims, ordinary citizens, corporations, journalists, and others. Because Tor is used at such a high level for law enforcement and national security applications, it faces more significant adversaries than most other uses. This chapter discusses some of the types of threats against which Tor currently offers only limited protection and the impacts of these on all classes of users, but especially on those most likely to confront them.

Keywords:   onion routing system, U.S. Naval Research Laboratory, Tor, intelligence gathering systems, law enforcement, national security, cyber security

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .