ieee.es

Search in this website

Publication

21/02/2012

Anonymisation networks on the Internet: how they work and what its limits (DIEEEO16-2012)

Whistleblower sites like Wikileaks, attacks from Anonymous, funding networks of the organized crime, botnets and terrorist organizations use Internet. They need confidentiality in their communications, and it means more than just cipher their messages. They need to hide the source or destination of their links and then to avoid localization. Therefore they will use of anonymity networks, like Tor. Although, those networks are not a full guarantee of privacy, thus they have limits, risks and a degree of privacy that could be dodged.

Author: Luis de Salvador Carrasco

THIS DOCUMENT IS ONLY AVAILABLE IN SPANISH LANGUAGE.

© Copyright 2010 Spanish Institute for Strategic Studies