About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
IEEE Security and Privacy
Paper
Investigative Techniques for the De-Anonymization of Hidden Services
Abstract
Anonymity networks, also referred to as anonymous networks or darknets are an example of privacy-enhancing technology, the historical goal of which is to avoid censorship, preserve user privacy, and promote freedom of speech. The Tor network, undoubtedly the most popular anonymization technology at the time of this writing, according to its website, has several categories of users: individuals who wish to safeguard their online activity, businesses wanting to keep data confidential or conducting competitive analysis, journalists willing to protect anonymous sources and sensitive research, and activists who want to report abuses from danger zones.