8 Hits in 4.4 sec

Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym

David Harborth, Sebastian Pape, Kai Rannenberg
2020 Proceedings on Privacy Enhancing Technologies  
One of the most famous ways to accomplish this, is to use privacy-enhancing technologies (PETs). However, the number of users is particularly important for the anonymity set of the service.  ...  We conducted an online survey with 265 users of the anonymity services Tor and JonDonym (124 users of Tor and 141 users of JonDonym).  ...  However, the model is well suited for our case of explaining the behavioral intention and actual use behavior of PETs due to the following reasons.  ... 
doi:10.2478/popets-2020-0020 fatcat:ny24a4g7xzghfjig4y574jybqa

"All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content

Vanessa Bracamonte, Sebastian Pape, Sascha Loebner
2022 Proceedings on Privacy Enhancing Technologies  
use of their personal information compared to non-privacy tools.  ...  user of a privacy risk and transform the content.  ...  Acknowledgements This research was partially supported by the European Union's Horizon 2020 research and innovation program from the project CyberSec4Europe (grant agreement number 830929).  ... 
doi:10.56553/popets-2022-0062 fatcat:vndlrrvwrveh3ade5xapvchwye

Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility [chapter]

Christian Banse, Dominik Herrmann, Hannes Federrath
2012 IFIP Advances in Information and Communication Technology  
In contrast to explicit tracking it can be used to link multiple Internet sessions of a user passively, i. e., without the user's cooperation and even in the absence of unique identifiers or tracking cookies  ...  The actual privacy threat of behavioral profiles is unknown so far, because previously published results were obtained with a limited number of concurrent users (up to 100 in [26] ) in a closed-world evaluation  ...  We thank Martin Wimmer, head of the computing center of the University of Regensburg and his employees, who enabled the compilation of our dataset.  ... 
doi:10.1007/978-3-642-30436-1_20 fatcat:cn5lfczz35ddplf4c5dmfojuiq

Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation [chapter]

Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath
2013 IFIP Advances in Information and Communication Technology  
Evaluating and improving the performance of anonymity systems in a real-world setting is critical to foster their adoption.  ...  In comparison to other approaches our workload models are more realistic, as they derive characteristics from trace files recorded in real networks and preserve dependencies of the flows of individual  ...  We thank our colleague Andrey Kolesnikov (Telecommunications and Computer Networks Group) for insightful discussions regarding workload modelling in the network research community.  ... 
doi:10.1007/978-3-642-39218-4_13 fatcat:fpcg5qlk3nchrhoyauokiq6cyi

A survey on solutions and main free tools for privacy enhancing Web communications

A. Ruiz-Martínez
2012 Journal of Network and Computer Applications  
In this paper we present an analysis of both these solutions and the main tools that are freely distributed or can be used freely and that implement some of these techniques and methods to preserve privacy  ...  used to achieve Web privacy goal.  ...  Acknowledgements This work has been partially funded by the "Seneca Foundation for Excellent Group in the Region 04552/GERM/06", TIN2008-06441-C02-02 "Infraestructure of ubquitous services and communications  ... 
doi:10.1016/j.jnca.2012.02.011 fatcat:zogduabsyvgyvies4vzpeccgeu

Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2014 [article]

Georg Carle, Daniel Raumer, Lukas Schwaighofer, Chair For Network Architectures
Satisfying privacy and security at the same time is a difficult task, as the use case of billing with time-dependent tariffs illustrates.  ...  Of course, this depends on the used hardware and can be different for other applications and use cases.  ...  Self-healing use cases by 3GPP The 3GPP, 3 rd Generation Partnership Program has therefore defined sell-healing use cases.  ... 
doi:10.2313/net-2014-08-1 fatcat:xbhymyqonrdkjnmfqybdkych6a

Towards an Evaluation of a Recommended Tor Browser Configuration in Light of Website Fingerprinting Attacks

Fayzah Alshammari, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
Website Fingerprinting (WF) attacks have become an area of concern for advocates of web Privacy Enhancing Technology (PET)s as they may allow a passive, local, eaves- dropper to eventually identify the  ...  That leads to suspicion in the Tor community and among Tor Browser users about the efficacy of those attacks in real-world scenarios.  ...  This builds a case against the privacy and security assurance claimed by Tor (a PET that promises to strengthen users' civil rights such as privacy and freedom of speech around the world).  ... 
doi:10.20381/ruor-20806 fatcat:s3zdblf4qjfm3odyi4w65dsa4m

Onions in the queue [article]

Florian Tschorsch, Humboldt-Universität Zu Berlin, Humboldt-Universität Zu Berlin
We develop solutions to a number of research questions, all collectively following the aim of enhancing and securing such networks.  ...  In this work, we discuss the design of low-latency anonymous communication systems in general and the Tor network as the de-facto standard in particular.  ...  In the specific use case of Tor, the counting operation could be performed at the directory mirrors.  ... 
doi:10.18452/17554 fatcat:4eadtebsb5aa7gtti4bey7dgvq