Understanding Tor Usage with Privacy-Preserving Measurement

09/22/2018
by   Akshaya Mani, et al.
0

The Tor anonymity network is difficult to measure because, if not done carefully, measurements could risk the privacy (and potentially the safety) of the network's users. Recent work has proposed the use of differential privacy and secure aggregation techniques to safely measure Tor, and preliminary proof-of-concept prototype tools have been developed in order to demonstrate the utility of these techniques. In this work, we significantly enhance two such tools--PrivCount and Private Set-Union Cardinality--in order to support the safe exploration of new types of Tor usage behavior that have never before been measured. Using the enhanced tools, we conduct a detailed measurement study of Tor covering three major aspects of Tor usage: how many users connect to Tor and from where do they connect, with which destinations do users most frequently communicate, and how many onion services exist and how are they used. Our findings include that Tor has 8 million daily users (a factor of four more than previously believed) while Tor user IPs turn over almost twice in a 4 day period. We also find that 40 torproject.org domain name, 10 and 80 million sites list. Finally, we find that 90 are invalid, and more than 90

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/19/2022

An Evaluation of Open-source Tools for the Provision of Differential Privacy

The concept of differential privacy has widely penetrated academia and i...
research
01/24/2019

OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

Millions of users routinely use Google to log in to websites supporting ...
research
06/30/2022

Accountable Private Set Cardinality for Distributed Measurement

We introduce cryptographic protocols for securely and efficiently comput...
research
10/10/2018

Towards Differentially Private Truth Discovery for Crowd Sensing Systems

Nowadays, crowd sensing becomes increasingly more popular due to the ubi...
research
08/23/2018

Privacy-Preserving Synthetic Datasets Over Weakly Constrained Domains

Techniques to deliver privacy-preserving synthetic datasets take a sensi...
research
10/04/2021

Towards General-purpose Infrastructure for Protecting Scientific Data Under Study

The scientific method presents a key challenge to privacy because it req...

Please sign up or login with your details

Forgot password? Click here to reset