no code implementations • 16 Feb 2021 • Nguyen Phong Hoang, Arian Akhavan Niaki, Phillipa Gill, Michalis Polychronakis
Although the security benefits of domain name encryption technologies such as DNS over TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their positive impact on user privacy is weakened by--the still exposed--IP address information.
Cryptography and Security Networking and Internet Architecture
no code implementations • 6 Jun 2017 • Rishab Nithyanand, Brian Schaffner, Phillipa Gill
The Internet and online forums such as Reddit have become an increasingly popular medium for citizens to engage in political conversations.
1 code implementation • 19 May 2015 • Rishab Nithyanand, Oleksii Starov, Adva Zair, Phillipa Gill, Michael Schapira
We find that up to 40% of all circuits created by Tor are vulnerable to attacks by traffic correlation from Autonomous System (AS)-level adversaries, 42% from colluding AS-level adversaries, and 85% from state-level adversaries.
Cryptography and Security