from control hosts scans of the home pages of top-1,000 Alexa websites through every Tor exit and analysis of nearly a year of historic HTTP crawls from Tor network and control hosts. The researchers drew on several data sources: comparisons of internet-wide port scans from Tor exit nodes vs. Like some other Akamai sites, blocks over 60% of Tor exit nodes. The problem becomes amplified when ‘bottleneck’ web services (e.g., CloudFlare, Akamai) whose components are used by many other websites block or discriminate against Tor users, or when third-party blacklists used by a large number of websites include Tor infrastructure (in particular, exit node) IP addresses.ī is one example. The researchers, from the Universities of Cambridge and California-Berkeley, University College London, and International Computer Science Institute-Berkeley, said that the problem is amplified if it’s done by particular services: It involves giving Tor users crummy service or just blocking them outright. Rather, it’s about the lower-case version of anonymous, as in those who use Tor to help preserve anonymity.Īccording to the paper, titled Do You See What I See? Differential Treatment of Anonymous Users, 3.67% of the top 1,000 Alexa sites are blocking people using computers running known Tor exit-node IP addresses.Īnonymity networks – the “king” of which is Tor, to borrow the National Security Agency’s (NSA’s) description – already face a hostile environment that includes deanonymization attacks and government blocks. This isn’t about hacktivists associated with Anonymous. Anonymous users are being treated like second-class citizens, being blocked altogether by many sites, and being fed a degraded service or being forced to jump through hurdles like CAPTCHA on others, according to a recently published research paper.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |