Journal ArticleDOI
Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law
Tomáš Minárik,Anna-Maria Osula +1 more
TLDR
The human rights connotations of the anonymity provided by Tor are explored, coming to the conclusion that this anonymity is an integral part of certain human rights, particularly the right to privacy and theright to freedom of expression.About:
This article is published in Computer Law & Security Review.The article was published on 2016-02-01. It has received 15 citations till now. The article focuses on the topics: European union & The Right to Privacy.read more
Citations
More filters
Journal ArticleDOI
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review
TL;DR: A systematic analysis of research relating to Dark Net privacy and security on N=200 academic papers shows the apparent research gaps, especially in the user-focused studies emphasized in the paper.
Book ChapterDOI
TorBot: Open Source Intelligence Tool for Dark Web
TL;DR: With the use of this tool, researchers and Law Enforcement Agencies can automate their task of crawling and identifying different services in the Tor network and this tool has several features which can help extract different intelligence.
Book ChapterDOI
Monitorability Bounds via Expander, Sparsifier and Random Walks
Shlomi Dolev,Daniel Khankin +1 more
TL;DR: In this paper, the authors proposed SDN, NFV, and network virtualization (NV) as a mini-cosmos inside data centers, cloud providers, and enterprises.
Book ChapterDOI
On Building Onion Routing into Future Internet Architectures
TL;DR: The main design challenges of network layer onion routing protocols in FIAs are surveyed and the requirements and trade-offs of different design choices are empirically investigated.
Proceedings ArticleDOI
DARKWEB IMAGE SCRAPPER: An Open Source Intelligence Tool
TL;DR: In this paper , a tool is introduced to help law enforcement agencies and threat researchers to automate the task of extraction of pictorial intelligence from different malicious sites in the dark web, which is a method that is used to accumulate information on a specific targeted entity by gathering data available publicly.
References
More filters
BookDOI
Tallinn Manual on the International Law Applicable to Cyber Warfare
TL;DR: The Tallinn Manual as mentioned in this paper identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts, addressing topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality.
Convention for the Protection of Human Rights and Fundamental Freedoms
TL;DR: Konvencija sadrži kako osnovna ljudska prava i slobode tako i mehanizam nadzora od strane Evropskog suda za ljuda i Komiteta ministara EvroPSkog saveta i pravo da stavljaju rezerve na pojedine odredbe Konvencije i protokola.
Book
Computer Crimes and Digital Investigations
TL;DR: Changing landscape and shifting priorities Law, code, and rules Regulating and policing cyberspace Where next?