scispace - formally typeset
Journal ArticleDOI

Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law

TLDR
The human rights connotations of the anonymity provided by Tor are explored, coming to the conclusion that this anonymity is an integral part of certain human rights, particularly the right to privacy and theright to freedom of expression.
About
This article is published in Computer Law & Security Review.The article was published on 2016-02-01. It has received 15 citations till now. The article focuses on the topics: European union & The Right to Privacy.

read more

Citations
More filters
Journal ArticleDOI

SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review

TL;DR: A systematic analysis of research relating to Dark Net privacy and security on N=200 academic papers shows the apparent research gaps, especially in the user-focused studies emphasized in the paper.
Book ChapterDOI

TorBot: Open Source Intelligence Tool for Dark Web

TL;DR: With the use of this tool, researchers and Law Enforcement Agencies can automate their task of crawling and identifying different services in the Tor network and this tool has several features which can help extract different intelligence.
Book ChapterDOI

Monitorability Bounds via Expander, Sparsifier and Random Walks

TL;DR: In this paper, the authors proposed SDN, NFV, and network virtualization (NV) as a mini-cosmos inside data centers, cloud providers, and enterprises.
Book ChapterDOI

On Building Onion Routing into Future Internet Architectures

TL;DR: The main design challenges of network layer onion routing protocols in FIAs are surveyed and the requirements and trade-offs of different design choices are empirically investigated.
Proceedings ArticleDOI

DARKWEB IMAGE SCRAPPER: An Open Source Intelligence Tool

TL;DR: In this paper , a tool is introduced to help law enforcement agencies and threat researchers to automate the task of extraction of pictorial intelligence from different malicious sites in the dark web, which is a method that is used to accumulate information on a specific targeted entity by gathering data available publicly.
References
More filters
BookDOI

Tallinn Manual on the International Law Applicable to Cyber Warfare

TL;DR: The Tallinn Manual as mentioned in this paper identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts, addressing topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality.

Convention for the Protection of Human Rights and Fundamental Freedoms

TL;DR: Konvencija sadrži kako osnovna ljudska prava i slobode tako i mehanizam nadzora od strane Evropskog suda za ljuda i Komiteta ministara EvroPSkog saveta i pravo da stavljaju rezerve na pojedine odredbe Konvencije i protokola.
Book

Computer Crimes and Digital Investigations

Ian Walden
TL;DR: Changing landscape and shifting priorities Law, code, and rules Regulating and policing cyberspace Where next?
Related Papers (5)