S
Sarah Cortes
Researcher at Northeastern University
Publications - 6
Citations - 46
Sarah Cortes is an academic researcher from Northeastern University. The author has contributed to research in topics: The Internet & Network element. The author has an hindex of 3, co-authored 6 publications receiving 33 citations. Previous affiliations of Sarah Cortes include Salesforce.com.
Papers
More filters
Journal ArticleDOI
The darknet's smaller than we thought: The life cycle of Tor Hidden Services
TL;DR: An analysis is presented of the use of crawling and whether this is an effective mechanism to discover sites for law enforcement and the first examination of its kind will be presented on the differences between short-lived and long-lived hidden services.
Journal ArticleDOI
20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables
TL;DR: It is proposed that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries, and a modular system is presented that allows users to efficiently and conveniently create such distributions and use them to improve their security.
Journal Article
MLAT Jiu-Jitsu and Tor: Mutual Legal Assistance Treaties in Surveillance
TL;DR: A corrupt Australian Law Enforcement Agency (LEA) wishes to track the communications of a journalist who has published leaked whistleblowing documents from a confidential source, revealing the Australian LEA’s complicity in illegal narcotics activity.
Journal ArticleDOI
MLATs and TorBrowser: Mutual Legal Assistance Treaties in Online Anonymity Technology and Domestic Surveillance
TL;DR: In this paper, the authors review the role of Mutual Legal Assistance Treaties (MLATs) in mass global surveillance, including Tor Browser, and show that they have been used by the US government to break Tor encryption and privacy protections.
Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.
TL;DR: This work uses legal and technical data to assess the hostility of each country to Internet traffic, and builds a graph of the intelligence treaties between countries to identify cross-border surveillance capabilities, and develops metrics that quantify the ability of an adversarial GIA to conduct surveillance in any other country.