We also take the opportunity of this paper, to appeal the majors internet companies, to help in the creation of a responsible Tor network (without pedophiles, spies, ....), by mixing billions of data flowing through their networks with those of Tor.
Category / Keywords: applications / Tor, cryptography, privacy, anonymity, secret sharing. Date: received 6 Mar 2015 Contact author: amadou1 at gmail com Available format(s): PDF | BibTeX Citation Version: 20150308:083702 (All versions of this report) Short URL: ia.cr/2015/215 Discussion forum: Show discussion | Start new discussion