FINDING · DEFENSE

Encrypting traffic at the application layer still discloses communicating parties to every ISP along the path; overlay anonymization is subject to blacklisting of exit nodes and traffic analysis. The paper argues that effective privacy requires building anonymity into the network routing layer itself, with the necessary tradeoff being hardware cost and routing inefficiency for privacy-requiring circuits.

From 2011-liu-torTor Instead of IP · §1, §8 · 2011 · Hot Topics in Networks

Implications

Tags

censors
generic
techniques
flow-correlationip-blocking
defenses
meta-resistancetor

Extracted by claude-sonnet-4-6 — review before relying.