[PDF][PDF] Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it

R Dingledine, SJ Murdoch - Online: http://www. torproject. org/press …, 2009 - cl.cam.ac.uk
As Tor's user base has grown, the performance of the Tor network has suffered. This
document describes our current understanding of why Tor is slow, and lays out our options …

DefenestraTor: Throwing out windows in Tor

M AlSabah, K Bauer, I Goldberg, D Grunwald… - … Symposium, PETS 2011 …, 2011 - Springer
Tor is one of the most widely used privacy enhancing technologies for achieving online
anonymity and resisting censorship. While conventional wisdom dictates that the level of …

Mind the gap: Towards a {Backpressure-Based} transport protocol for the tor network

F Tschorsch, B Scheuermann - 13th USENIX Symposium on Networked …, 2016 - usenix.org
Tor has become the prime example for anonymous communication systems. With increasing
popularity, though, Tor is also faced with increasing load. In this paper, we tackle one of the …

[PDF][PDF] Comparison of Tor datagram designs

SJ Murdoch - The Tor Project, 2011 - Citeseer
1 Background A number of performance-related problems have been noted with the current
Tor architecture, resulting in many users restricting their Tor usage to only tasks which are of …

Tor is unfair—And what to do about it

F Tschorsch, B Scheuermann - 2011 IEEE 36th Conference on …, 2011 - ieeexplore.ieee.org
Tor is one of the most popular network anonymization services. With increasing popularity,
however, Tor is also faced with increasing load. Mechanisms for handling congestion and …

How (not) to build a transport layer for anonymity overlays

F Tschorsch, B Scheuermann - ACM SIGMETRICS Performance …, 2013 - dl.acm.org
Internet anonymity systems, like for instance Tor, are in widespread use today. Technically
they are realized as overlays, ie, they add another instance of routing, forwarding, and …

Scaling up anonymous communication with efficient nanopayment channels

TN Dinh, F Rochet, O Pereira… - … on Privacy Enhancing …, 2020 - researchportal.unamur.be
Tor, the most widely used and well-studied traffic anonymization network in the world, suffers
from limitations in its network diversity and performance. We propose to mitigate both …

[PDF][PDF] Unleashing Tor, BitTorrent & Co.: How to Relieve TCP Deficiencies in Overlays (Extended Version)

D Marks, F Tschorsch… - … , Germany, Tech. Rep …, 2010 - publications.cs.hhu.de
Many overlay-based distributed applications employ TCP for the communication between
peer nodes. Typically, the TCP connections of one peer will all share one physical Internet …

IPsec-based anonymous networking: A working implementation

C Kiraly, RL Cigno - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
Protecting users' privacy is becoming one of the rising issues for the success of future
communications. The Internet in particular, with its open architecture, presents several …

Improving Security and Performance in Low Latency Anonymous Networks

KS Bauer - 2011 - search.proquest.com
Conventional wisdom dictates that the level of anonymity offered by low latency anonymity
networks increases as the user base grows. However, the most significant obstacle to …