Uses and Limitations of Online Anonymity
Tor is a network of virtual tunnels that allows people and groups to improve their anonymity and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. This chapter first explains how using Tor protects users against a common form of Internet surveillance known as traffic analysis. It then describes typical Tor usage by regular people, the military, journalists, law enforcement officers, activists and whistle-blowers, and business executives.
Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.
If you think you should have access to this title, please contact your librarian.