Is “KAX17” performing de-anonymization Attacks against Tor Users?Hashtag: #KAX17Nov 29, 20211Nov 29, 20211
Tracking One Year of Malicious Tor Exit Relay Activities (Part II)>25% of the Tor network’s exit capacity has been attacking Tor usersMay 8, 20212May 8, 20212
How Malicious Tor Relays are Exploiting Users in 2020 (Part I)>23% of the Tor network’s exit capacity has been attacking Tor usersAug 9, 20203Aug 9, 20203
Why I disappeared from TwitterSince there have been some speculations and questions around why all of a sudden I disappeared from twitter I’d figure I give you with my…Jan 12, 20202Jan 12, 20202
What fraction of Tor’s DNS traffic goes to Google and Cloudflare?“Who controls Tor’s DNS traffic?” revisitedJul 11, 2019Jul 11, 2019
Where are RPKI unreachable networks located?Mapping the RPKI unreachable IP address space.Sep 25, 2018Sep 25, 2018
Towards cleaning up RPKI INVALIDsUp until not too long ago basically no network operator actually protected herself by implementing route origin validation (ROV) to make…Sep 15, 2018Sep 15, 2018
How vulnerable is the Tor Network to BGP Hijacking Attacks?Privacy adversaries may use BGP hijacking attacks to gain access to a bigger portion of Tor traffic than they would be able to see…Aug 20, 2018Aug 20, 2018