nusenuIs “KAX17” performing de-anonymization Attacks against Tor Users?Hashtag: #KAX1710 min read·Nov 29, 2021--1--1
nusenuTracking One Year of Malicious Tor Exit Relay Activities (Part II)>25% of the Tor network’s exit capacity has been attacking Tor users19 min read·May 8, 2021--2--2
nusenuHow Malicious Tor Relays are Exploiting Users in 2020 (Part I)>23% of the Tor network’s exit capacity has been attacking Tor users12 min read·Aug 9, 2020--3--3
nusenuWhy I disappeared from TwitterSince there have been some speculations and questions around why all of a sudden I disappeared from twitter I’d figure I give you with my…4 min read·Jan 12, 2020--2--2
nusenuThe Growing Problem of Malicious Relays on the Tor NetworkBackground6 min read·Dec 8, 2019--1--1
nusenuWhat fraction of Tor’s DNS traffic goes to Google and Cloudflare?“Who controls Tor’s DNS traffic?” revisited3 min read·Jul 11, 2019----
nusenuWhere are RPKI unreachable networks located?Mapping the RPKI unreachable IP address space.4 min read·Sep 25, 2018----
nusenuTowards cleaning up RPKI INVALIDsUp until not too long ago basically no network operator actually protected herself by implementing route origin validation (ROV) to make…7 min read·Sep 15, 2018----
nusenuHow vulnerable is the Tor Network to BGP Hijacking Attacks?Privacy adversaries may use BGP hijacking attacks to gain access to a bigger portion of Tor traffic than they would be able to see…13 min read·Aug 20, 2018----
nusenuWho controls Tor’s DNS traffic?An Analysis of the Tor DNS Landscape.8 min read·May 10, 2018--2--2