The fifteen year struggle of decentralizing privacy-enhancing technology http://arxiv.org/abs/1404.4818 Censorship in the Wild: Analyzing Web Filtering in Syria http://arxiv.org/abs/1402.3401 Spoiled Onions: Exposing Malicious Tor Exit Relays http://arxiv.org/abs/1401.4917 Seeking Anonymity in an Internet Panopticon http://arxiv.org/abs/1312.5307 Managing NymBoxes for Identity and Tracking Protection http://arxiv.org/abs/1312.3665 ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship http://arxiv.org/abs/1305.3199 Pisces: Anonymous Communication Using Social Networks http://arxiv.org/abs/1208.6326 Torinj : Automated Exploitation Malware Targeting Tor Users http://arxiv.org/abs/1208.2877 How China Is Blocking Tor http://arxiv.org/abs/1204.0447 STor: Social Network based Anonymous Communication in Tor http://arxiv.org/abs/1110.5794 Effectiveness and detection of denial of service attacks in Tor http://arxiv.org/abs/1110.5395
http://redecentralize.org/about/ -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
