Abstract:Concern for privacy when users are surfing on the Web has increased recently. Nowadays, many users are aware that when they are accessing Web sites, these Web sites can track them and create profiles on the elements they access, the advertisements they see, the different links they visit, from which Web sites they come from and to which sites they exit, and so on. In order to maintain user privacy, several techniques, methods and solutions have appeared. In this paper we present an analysis of both these solut… Show more
“…Even if not specifically designed for censorship circumvention, anonymity technologies can and have been used to circumvent censorship: a recent survey on usage of several technologies including proxy servers, remailers, overlay networks such as JAP (Köpsell et al [92]), I2P (Schomburg [135]), and Tor (Dingledine et al [46]) is provided by Li et al [102]. 4 Specifically dealing with web browsing activities, a survey on "privacy enhancing" tools is presented by Ruiz-Martínez [133]. A comprehensive source for academic literature on anonymity is the structured bibliography page of the Free Haven project [59].…”
“…Even if not specifically designed for censorship circumvention, anonymity technologies can and have been used to circumvent censorship: a recent survey on usage of several technologies including proxy servers, remailers, overlay networks such as JAP (Köpsell et al [92]), I2P (Schomburg [135]), and Tor (Dingledine et al [46]) is provided by Li et al [102]. 4 Specifically dealing with web browsing activities, a survey on "privacy enhancing" tools is presented by Ruiz-Martínez [133]. A comprehensive source for academic literature on anonymity is the structured bibliography page of the Free Haven project [59].…”
“…Tor not only can hide the user's location but also can protect the entire information being transferred using encryption [17,18]. Tor sends user information through a number of Tor servers located around the world, provided by a voluntary basis (to provide a public service).…”
Section: ) Share Fingerprinting With Othersmentioning
Abstract-This paper discusses possible approaches to address the loss of user privacy when browsing the web and being tracked by websites which compute a browser fingerprint identifying the user computer. The key problem is that the current fingerprinting countermeasures are insufficient to prevent fingerprinting tracking and also frequently produce sideeffects on the web browser. The advantages and disadvantages of possible countermeasures are discussed in the context of improving resistance against browser fingerprinting. Finally, using a new browser extension is proposed as the best way to inhibit fingerprinting as it could probably inhibit some of the fingerprinting techniques used and also diminish the side-effects on the user browser experience, compared with existing techniques.
“…Initially interest in this field was primarily theoretical but in the last 30 years a lot of research in this field has looked at developing practical and usable systems for preserving anonymity [10,11]. Such systems include Mixmaster [12], Mixminion [13], TOR [14], I2P [15] and many others which are actively under development.…”
Section: Firewalls and Intrusion Detec-tion Systemsmentioning
Protecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to constantly vigilant in order to guard against intruders on their networks and groups or individuals that seek to intercept their communications. Companies turn to Firewall and Intrusion Detection System vendors to help them safeguard their information and infrastructure. These companies are putting their faith in expensive devices that attempt to distinguish between friendly and malicious traffic. Despite the expense and complexity of these systems, malicious users seem to find ways to avoid detection and news of massive breaches have become an almost daily occurrence. We propose to fundamentally change the way to look at information security. We highlight some of the fundamental flaws in current systems and expose risks that many experts know, but are not aware of.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.