[PDF][PDF] Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it
As Tor's user base has grown, the performance of the Tor network has suffered. This
document describes our current understanding of why Tor is slow, and lays out our options …
document describes our current understanding of why Tor is slow, and lays out our options …
DefenestraTor: Throwing out windows in Tor
Tor is one of the most widely used privacy enhancing technologies for achieving online
anonymity and resisting censorship. While conventional wisdom dictates that the level of …
anonymity and resisting censorship. While conventional wisdom dictates that the level of …
Mind the gap: Towards a {Backpressure-Based} transport protocol for the tor network
F Tschorsch, B Scheuermann - 13th USENIX Symposium on Networked …, 2016 - usenix.org
Tor has become the prime example for anonymous communication systems. With increasing
popularity, though, Tor is also faced with increasing load. In this paper, we tackle one of the …
popularity, though, Tor is also faced with increasing load. In this paper, we tackle one of the …
[PDF][PDF] Comparison of Tor datagram designs
SJ Murdoch - The Tor Project, 2011 - Citeseer
1 Background A number of performance-related problems have been noted with the current
Tor architecture, resulting in many users restricting their Tor usage to only tasks which are of …
Tor architecture, resulting in many users restricting their Tor usage to only tasks which are of …
Tor is unfair—And what to do about it
F Tschorsch, B Scheuermann - 2011 IEEE 36th Conference on …, 2011 - ieeexplore.ieee.org
Tor is one of the most popular network anonymization services. With increasing popularity,
however, Tor is also faced with increasing load. Mechanisms for handling congestion and …
however, Tor is also faced with increasing load. Mechanisms for handling congestion and …
How (not) to build a transport layer for anonymity overlays
F Tschorsch, B Scheuermann - ACM SIGMETRICS Performance …, 2013 - dl.acm.org
Internet anonymity systems, like for instance Tor, are in widespread use today. Technically
they are realized as overlays, ie, they add another instance of routing, forwarding, and …
they are realized as overlays, ie, they add another instance of routing, forwarding, and …
Scaling up anonymous communication with efficient nanopayment channels
Tor, the most widely used and well-studied traffic anonymization network in the world, suffers
from limitations in its network diversity and performance. We propose to mitigate both …
from limitations in its network diversity and performance. We propose to mitigate both …
[PDF][PDF] Unleashing Tor, BitTorrent & Co.: How to Relieve TCP Deficiencies in Overlays (Extended Version)
D Marks, F Tschorsch… - … , Germany, Tech. Rep …, 2010 - publications.cs.hhu.de
Many overlay-based distributed applications employ TCP for the communication between
peer nodes. Typically, the TCP connections of one peer will all share one physical Internet …
peer nodes. Typically, the TCP connections of one peer will all share one physical Internet …
IPsec-based anonymous networking: A working implementation
Protecting users' privacy is becoming one of the rising issues for the success of future
communications. The Internet in particular, with its open architecture, presents several …
communications. The Internet in particular, with its open architecture, presents several …
Improving Security and Performance in Low Latency Anonymous Networks
KS Bauer - 2011 - search.proquest.com
Conventional wisdom dictates that the level of anonymity offered by low latency anonymity
networks increases as the user base grows. However, the most significant obstacle to …
networks increases as the user base grows. However, the most significant obstacle to …