Tor and Circumvention: Lessons Learned

(Abstract to Go with Invited Talk)
  • Roger Dingledine
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6841)


Tor is a free-software anonymizing overlay network that helps people around the world use the Internet in safety. Tor’s 2500 volunteer relays carry almost 10Gb/s of traffic for several hundred thousand users each day.


Lesson Learn Correlation Attack Anonymous Communication Deep Packet Inspection 13th USENIX 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Dingledine, R., Mathewson, N.: Design of a blocking-resistant anonymity system. Technical Report 2006-1, The Tor Project (November 2006)Google Scholar
  2. 2.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proc. 13th USENIX Security Symposium (August 2004)Google Scholar
  3. 3.
    Loesing, K., Murdoch, S.J., Dingledine, R.: A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 203–215. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Murdoch, S.J., Zieliński, P.: Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 167–183. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© International Association for Cryptologic Research 2011

Authors and Affiliations

  • Roger Dingledine
    • 1
  1. 1.The Tor Project

Personalised recommendations