![Page 1: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/1.jpg)
No Right to Remain Silent: Isolating Malicious Mixes
Hemi Leibowitz1 Ania M. Piotrowska2 George Danezis2 Amir Herzberg3
1Bar-Ilan University, IL 2University College London, UK 3University of Connecticut, US
![Page 2: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/2.jpg)
INTRODUCTION (what the paper is all about)
● Anonymity is important and challenging
![Page 3: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/3.jpg)
INTRODUCTION (what the paper is all about)
● Anonymity is important and challenging
“Anonymity loves company”
System Efficiency Security
Onion routing (e.g., Tor)Efficient, low-latency,
practical, popular
![Page 4: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/4.jpg)
INTRODUCTION (what the paper is all about)
● Anonymity is important and challenging
From “Tor: The Second-Generation Onion Router”:
“Tor does not claim to completely solve end-to-end timing or
intersection attacks.”
System Efficiency Security
Onion routing (e.g., Tor)Efficient, low-latency,
practical, popularInsecure against timing attacks
![Page 5: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/5.jpg)
INTRODUCTION (what the paper is all about)
● Anonymity is important and challenging
System Efficiency Security
Onion routing (e.g., Tor)Efficient, low-latency,
practical, popularInsecure against timing attacks
Classic mixnets Efficient, higher latencySecure against global eavesdropper and
curious not malicious servers (mixes)
![Page 6: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/6.jpg)
INTRODUCTION (what the paper is all about)
● Anonymity is important and challenging
System Efficiency Security
Onion routing (e.g., Tor)Efficient, low-latency,
practical, popularInsecure against timing attacks
Classic mixnets Efficient, higher latencySecure against global eavesdropper and
curious not malicious servers (mixes)
Dining Cryptographers networks (DCnets), secure
shuffle
High overhead (computing and/or communication)
Secure against global eavesdropper and malicious servers
![Page 7: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/7.jpg)
INTRODUCTION (what the paper is all about)
● Anonymity is important and challenging
System Efficiency Security
Onion routing (e.g., Tor)Efficient, low-latency,
practical, popularInsecure against timing attacks
Classic mixnets Efficient, higher latencySecure against global eavesdropper and
curious not malicious servers (mixes)
Miranda's mixnet (this work) Efficient, higher latencySecure against global eavesdropper and
malicious servers (mixes)
Dining Cryptographers networks (DCnets), secure
shuffle
High overhead (computing and/or communication)
Secure against global eavesdropper and malicious servers
![Page 8: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/8.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Senders Receivers
![Page 9: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/9.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Mix server
Senders Receivers
![Page 10: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/10.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Senders Receivers
Mix server
![Page 11: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/11.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Senders Receivers
Mix server
![Page 12: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/12.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Senders Receivers
Mix server
Incoming and outgoing messages are unlinkable, to an outside observer
![Page 13: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/13.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Mix cascade
Chaining mixes in a cascade prevents any single mix from tracking messages end-to-end.
![Page 14: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/14.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Mix cascade
Chaining mixes in a cascade prevents any single mix from tracking messages end-to-end.
![Page 15: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/15.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Mix cascade
Chaining mixes in a cascade prevents any single mix from tracking messages end-to-end.
![Page 16: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/16.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Mix cascade
Chaining mixes in a cascade prevents any single mix from tracking messages end-to-end.
![Page 17: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/17.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
Directoryauthorities
Cascade
![Page 18: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/18.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
![Page 19: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/19.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
![Page 20: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/20.jpg)
INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)
A single honest mix in the cascade is enough to provide protection against passive global observer
![Page 21: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/21.jpg)
Alice
Bob
MOTIVATION (why malicious mixes are a threat to mixnets)
![Page 22: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/22.jpg)
Alice
Bob
Alice communicates with Bob!
MOTIVATION (why malicious mixes are a threat to mixnets)
![Page 23: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/23.jpg)
MIRANDA’S DESIGN (assumptions)
● A fixed set of mixes (no churn)
● More honest mixes than malicious mixes (no Sybil)
● Reliable communication and processing
● Synchronized clocks
![Page 24: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/24.jpg)
MIRANDA’S DESIGN (challenges)
● Detect attacks by malicious mixes
● Penalize the malicious mix
● Identify the malicious mix
![Page 25: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/25.jpg)
✔ Detect attacks by malicious mixes
● Penalize the malicious mix
● Identify the malicious mix
MIRANDA’S DESIGN (challenges)
![Page 26: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/26.jpg)
Alice
IDENTIFYING THE MALICIOUS MIX IS CHALLENGING
![Page 27: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/27.jpg)
Alice
My message never arrived to its
destination. Did you forward it?!
IDENTIFYING THE MALICIOUS MIX IS CHALLENGING
![Page 28: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/28.jpg)
AliceOf course I’ve forwarded it!
My message never arrived to its
destination. Did you forward it?!
Hey!!! I didn’t get this
message!
IDENTIFYING THE MALICIOUS MIX IS CHALLENGING
![Page 29: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/29.jpg)
AliceOf course I’ve forwarded it!
My message never arrived to its
destination. Did you forward it?!
Hey!!! I didn’t get this
message!
Of course I’ve forwarded it!
My message never arrived to its
destination. Did you forward it?!
Hey!!! I didn’t get this
message!
IDENTIFYING THE MALICIOUS MIX IS CHALLENGING
Alice
![Page 30: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/30.jpg)
MIRANDA (focus on problematic pair of mixes)
A problematic pair of mixes ⇒ don’t use the link between them
Alice Of course I’ve forwarded it!
My message never arrived to its
destination. Did you forward it?!
Hey!!! I didn’t get this
message!
![Page 31: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/31.jpg)
A problematic pair of mixes ⇒ don’t use the link between them
Alice
My message never arrived to its
destination. Did you forward it?!
Of course I’ve forwarded it!
MIRANDA (focus on problematic pair of mixes)
Hey!!! I didn’t get this
message!
![Page 32: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/32.jpg)
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
In the beginning, everyone are willing to
communicate with each other
M2
M1
M5
M4
M3
![Page 33: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/33.jpg)
Miranda detects problematic pairs involved in active
attacks, and removes their shared links,
eliminating these attack vectors
M2
M1
M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 34: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/34.jpg)
Miranda detects problematic pairs involved in active
attacks, and removes their shared links,
eliminating these attack vectors
M2
M1
M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 35: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/35.jpg)
Miranda detects problematic pairs involved in active
attacks, and removes their shared links,
eliminating these attack vectors
M2
M1
M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 36: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/36.jpg)
Miranda detects problematic pairs involved in active
attacks, and removes their shared links,
eliminating these attack vectors
M2
M1
M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 37: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/37.jpg)
Miranda detects problematic pairs involved in active
attacks, and removes their shared links,
eliminating these attack vectors
M2
M1
M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 38: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/38.jpg)
Miranda detects problematic pairs involved in active
attacks, and removes their shared links,
eliminating these attack vectors
M2
M1
M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 39: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/39.jpg)
Miranda detects problematic pairs involved in active
attacks, and removes their shared links,
eliminating these attack vectors
M2
M1
M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 40: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/40.jpg)
Miranda detects problematic pairs involved in active
attacks, and removes their shared links,
eliminating these attack vectors
M2
M1
M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 41: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/41.jpg)
Miranda detects problematic pairs involved in active
attacks, and removes their shared links,
eliminating these attack vectors
M2
M1
M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 42: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/42.jpg)
M2
M1
The result: malicious mixes are removed from the
system M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 43: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/43.jpg)
✔ Detect attacks by malicious mixes
✔ Penalize the malicious mix
➔ Identify the malicious mix
MIRANDA’S DESIGN (challenges)
![Page 44: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/44.jpg)
M2
M1
The result: malicious mixes are removed from the
system M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 45: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/45.jpg)
M2
M1
The result: malicious mixes are removed from the
system M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 46: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/46.jpg)
M2
M1
The result: malicious mixes are removed from the
system M5
M4
M3
MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)
![Page 47: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/47.jpg)
➔ Detect attacks by malicious mixes
✔ Penalize the malicious mix
✔ Identify the malicious mix
MIRANDA’S DESIGN (challenges)
![Page 48: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/48.jpg)
DETECTING AN ATTACK (using loop messages)
![Page 49: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/49.jpg)
A LOT MORE IN THE PAPER
● More details
● Community detection techniques: enhanced detection
● Mitigating protocol abuse
● Cascade compilation strategies
● Experimental results
![Page 50: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/50.jpg)
CONCLUSION
● Miranda is a step in the right direction, but we have not
reached the promised land yet
● Future work
○ Complete (provable) security analysis
○ Relax assumptions towards practicality (e.g., churn)
○ Further reduce latency
![Page 51: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor](https://reader036.vdocuments.us/reader036/viewer/2022070805/5f03b78b7e708231d40a6c81/html5/thumbnails/51.jpg)
THANK YOUQuestions?
(for example, why the name Miranda?)
Hemi Leibowitz
Ania M. Piotrowska
George Danezis
Amir Herzberg