Is “KAX17” performing de-anonymization Attacks against Tor Users?Hashtag: #KAX17Nov 29, 2021A response icon1Nov 29, 2021A response icon1
Tracking One Year of Malicious Tor Exit Relay Activities (Part II)>25% of the Tor network’s exit capacity has been attacking Tor usersMay 8, 2021A response icon2May 8, 2021A response icon2
How Malicious Tor Relays are Exploiting Users in 2020 (Part I)>23% of the Tor network’s exit capacity has been attacking Tor usersAug 9, 2020A response icon3Aug 9, 2020A response icon3
Why I disappeared from TwitterSince there have been some speculations and questions around why all of a sudden I disappeared from twitter I’d figure I give you with my…Jan 12, 2020A response icon2Jan 12, 2020A response icon2
The Growing Problem of Malicious Relays on the Tor NetworkBackgroundDec 8, 2019A response icon1Dec 8, 2019A response icon1
What fraction of Tor’s DNS traffic goes to Google and Cloudflare?“Who controls Tor’s DNS traffic?” revisitedJul 11, 2019Jul 11, 2019
Where are RPKI unreachable networks located?Mapping the RPKI unreachable IP address space.Sep 25, 2018Sep 25, 2018
Towards cleaning up RPKI INVALIDsUp until not too long ago basically no network operator actually protected herself by implementing route origin validation (ROV) to make…Sep 15, 2018Sep 15, 2018
How vulnerable is the Tor Network to BGP Hijacking Attacks?Privacy adversaries may use BGP hijacking attacks to gain access to a bigger portion of Tor traffic than they would be able to see…Aug 20, 2018Aug 20, 2018
Who controls Tor’s DNS traffic?An Analysis of the Tor DNS Landscape.May 10, 2018A response icon2May 10, 2018A response icon2