@online{enemies, author = {Radack, Jesselyn {and} Drake, Thomas {and} Binney, William}, title = {Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime.}, url = {https://events.ccc.de/congress/2012/Fahrplan/events/5338.en.html}, date = {2012-12-27} } @inproceedings{wright2008spot, title={Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations}, author={Wright, Charles V and Ballard, Lucas and Coull, Scott E and Monrose, Fabian and Masson, Gerald M}, booktitle={Security and Privacy, 2008. SP 2008. IEEE Symposium on}, pages={35--49}, year={2008}, organization={IEEE} } @article{wright2010uncovering, title={Uncovering spoken phrases in encrypted voice over IP conversations}, author={Wright, Charles V and Ballard, Lucas and Coull, Scott E and Monrose, Fabian and Masson, Gerald M}, journal={ACM Transactions on Information and System Security (TISSEC)}, volume={13}, number={4}, pages={35}, year={2010}, publisher={ACM} } @online{herman2010contemporary, author={Herrmann, D.}, title={Contemporary Profiling of Web Users}, subtitle={On Using Anonymizers and Still Get Fucked}, url={https://events.ccc.de/congress/2010/Fahrplan/events/4140.en.html}, date={2012-12-27} } @article{chaum1981untraceable, title={Untraceable electronic mail, return addresses, and digital pseudonyms}, author={Chaum, David L}, journal={Communications of the ACM}, volume={24}, number={2}, pages={84--90}, year={1981}, publisher={ACM} } @online{ritter2913remailer, title={What is a Remailer?}, author={Tom Ritter}, date={2013-01}, url={https://crypto.is/blog/} } @inproceedings{goldschlag1996hiding, title={Hiding routing information}, author={Goldschlag, David M and Reed, Michael G and Syverson, Paul F}, booktitle={Information Hiding}, pages={137--150}, year={1996}, organization={Springer} } @article{fu2009one, title={One cell is enough to break tor’s anonymity}, author={Fu, Xinwen and Ling, Zhen and Luo, J and Yu, W and Jia, W and Zhao, W}, journal={Proc. Black Hat DC}, year={2009} } @inproceedings{dingledine2006anonymity, title={Anonymity Loves Company: Usability and the Network Effect.}, author={Dingledine, Roger and Mathewson, Nick}, booktitle={WEIS}, year={2006} } @inproceedings{dingledine2006blending, title={Blending different latency traffic with alpha-mixing}, author={Dingledine, Roger and Serjantov, Andrei and Syverson, Paul}, booktitle={Privacy Enhancing Technologies}, pages={245--257}, year={2006}, organization={Springer} } @online{Matthewson2012changes, title={Top changes in Tor since the 2004 design paper (Part 1)}, author={Matthewson, N}, date={2012-10}, url={https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-1} } @online{unknown, title={Tor: Volunteer}, author={unknown}, date={}, url={https://www.torproject.org/getinvolved/volunteer.html.en} } @misc{applebaum2012Tor, title={The Tor Software Ecosystem}, author={Applebaum, Jacob and Dingledine, Roger}, addendum={29c3, Chaos Communication Congress}, date={2012-12-28}, url={https://events.ccc.de/congress/2012/Fahrplan/events/5306.en.html} } @online{Wilde2012Knockin, title={Knock Knock Knockin' on Bridges' Doors}, author={Wilde, T.}, date={2012-01}, url={https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors} }