อ้างอิง ของ ทอร์_(เครือข่ายนิรนาม)

  1. 1 2 Dingledine, Roger (2002-09-20). "Pre-alpha: run an onion proxy now!". or-dev mailing list. http://archives.seul.org/or/dev/Sep-2002/msg00019.html. เรียกข้อมูลเมื่อ 2008-07-17. 
  2. 1 2 "Tor". Open HUB. สืบค้นเมื่อ 2014-09-20.
  3. Hahn, Sebastian (2017-03-31). "[tor-dev] Tor in a safer language: Network team update from Amsterdam". สืบค้นเมื่อ 2017-04-01.
  4. 1 2 3 4 5 6 "Tor: Overview". The Tor Project. สืบค้นเมื่อ 2018-06-19.
  5. 1 2 3 4 5 6 7 Dingledine, Roger; Mathewson, Nick; Syverson, Paul (2004-08-13). "Tor: The Second-Generation Onion Router". Proc. 13th USENIX Security Symposium. San Diego, California. สืบค้นเมื่อ 2008-11-17.CS1 maint: ref=harv (link) tor-design.pdf PDF (292 KB)
  6. "Tor Project: Pluggable Transports". torproject.org. สืบค้นเมื่อ 2016-08-05.
  7. Li, Bingdong; Erdin, Esra; G?ne?, Mehmet Hadi; Bebis, George; Shipley, Todd (2011-06-14). "An Analysis of Anonymity Usage". ใน Domingo-Pascual, Jordi; Shavitt, Yuval; Uhlig, Steve (บ.ก.). Traffic Monitoring and Analysis: Third International Workshop, TMA 2011, Vienna, Austria, April 27, 2011, Proceedings. Berlin: Springer-Verlag. pp. 113–116. ISBN 978-3-642-20304-6. สืบค้นเมื่อ 2012-08-06.
  8. "Tor Project: FAQ". www.torproject.org. สืบค้นเมื่อ 2016-01-18.
  9. "Tor Network Status". สืบค้นเมื่อ 2016-01-14.
  10. Glater, Jonathan D. (2006-01-25). "Privacy for People Who Don't Show Their Navels". The New York Times. สืบค้นเมื่อ 2011-05-13.
  11. "Tor FAQ: I want to run another application through Tor". Tor Projects. สืบค้นเมื่อ 2018-06-19. If you are trying to use some external application with Tor, step zero should be to reread the set of warnings for ways you can screw up. Step one should be to try to use a SOCKS proxy rather than an HTTP proxy. Typically Tor listens for SOCKS connections on port 9050. Tor Browser listens on port 9150.
  12. "Tor FAQ: What programs can I use with Tor?". Tor Projects. สืบค้นเมื่อ 2018-06-19. Most people use Tor Browser, which includes everything you need to browse the web safely using Tor. Using other browsers is dangerous and not recommended. There are plenty of other programs you can use with Tor, but we haven't researched the application-level anonymity issues on all of them well enough to be able to recommend a safe configuration.
  13. 1 2 3 Alin, Andrei (2013-12-02). "Tor Browser Bundle Ubuntu PPA". Web Upd8. สืบค้นเมื่อ 2014-04-28.
  14. "Tor FAQ: I want to use Chrome/IE/Opera/etc with Tor". Tor Projects. สืบค้นเมื่อ 2018-06-19. In short, using any browser besides Tor Browser with Tor is a really bad idea. Our efforts to work with the Chrome team to add missing APIs were unsuccessful, unfortunately. Currently, it is impossible to use other browsers and get the same level of protections as when using Tor Browser.
  15. 1 2 3 4 5 Ball, James; Schneier, Bruce; Greenwald, Glenn (2013-10-04). "NSA and GCHQ target Tor network that protects anonymity of web users". The Guardian. สืบค้นเมื่อ 2013-10-05.
  16. 1 2 3 "Peeling back the layers of Tor with EgotisticalGiraffe". The Guardian. 2013-10-04. สืบค้นเมื่อ 2013-10-05.
  17. 1 2 Appelbaum, J; Gibson, A; Goetz, J; Kabisch, V; Kampf, L; Ryge, L (2014-07-03). "NSA targets the privacy-conscious". Panorama. Norddeutscher Rundfunk. สืบค้นเมื่อ 2014-07-04.CS1 maint: multiple names: authors list (link)
  18. 1 2 3 Dingledine, Roger (2014-07-30). "Tor security advisory: "relay early" traffic confirmation attack". The Tor Project.CS1 maint: ref=harv (link) CS1 maint: date and year (link)
  19. 1 2 3 4 5 6 "Court Docs Show a University Helped FBI Bust Silk Road 2, Child Porn Suspects". Motherboard. 2015-11-11. สืบค้นเมื่อ 2015-11-20.
  20. Goodin, Dan (2014-07-22). "Tor developers vow to fix bug that can uncloak users". Ars Technica.
  21. "Selected Papers in Anonymity". Free Haven.
  22. "Tor Research Home". torproject.org.
  23. 1 2 3 4 5 6 Levine, Yasha (2014-07-16). "Almost everyone involved in developing Tor was (or is) funded by the US government". Pando Daily. สืบค้นเมื่อ 2016-04-21.
  24. Callanan, Cormac; Dries-Ziekenheiner, Hein; Escudero-Pascual, Alberto; Guerra, Robert (2011). "Leaping Over the Firewall: A Review of Censorship Circumvention Tools" (PDF). Freedom House. Summary, pp. 28-29.CS1 maint: uses authors parameter (link)
  25. Freedom House (2011), Simplified Flowchart providing guidelines on how to select the appropriate tool, p. 16
  26. 1 2 Freedom House (2011), Tor, p. 41-42
  27. Fagoyinbo, Joseph Babatunde (2013-05-28). The Armed Forces: Instrument of Peace, Strength, Development and Prosperity. AuthorHouse. ISBN 978-1-4772-2647-6. สืบค้นเมื่อ 2014-08-29.
  28. Leigh, David; Harding, Luke (2011-02-08). WikiLeaks: Inside Julian Assange's War on Secrecy. PublicAffairs. ISBN 978-1-61039-062-0. สืบค้นเมื่อ 2014-08-29.
  29. Ligh, Michael; Adair, Steven; Hartstein, Blake; Richard, Matthew (2010-09-29). Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code. John Wiley & Sons. ISBN 978-1-118-00336-7. สืบค้นเมื่อ 2014-08-29.
  30. "Tor FAQ: Why is it called Tor?". Tor Project. สืบค้นเมื่อ 2011-07-01.
  31. Dingledine, Rogert. "Tor is free". Tor-dev Mail List. Tor Project. สืบค้นเมื่อ 2016-09-23.
  32. "Tor Project: Core People". Tor Project. สืบค้นเมื่อ 2008-07-17.
  33. "Tor Project Form 990 2008" (PDF). Tor Project. 2009. สืบค้นเมื่อ 2014-08-30.
  34. "Tor Project Form 990 2007" (PDF). Tor Project. 2008. สืบค้นเมื่อ 2014-08-30.
  35. "Tor Project Form 990 2009" (PDF). Tor Project. 2010. สืบค้นเมื่อ 2014-08-30.
  36. 1 2 3 "Tor: Sponsors". Tor Project. สืบค้นเมื่อ 2010-12-11.
  37. Krebs, Brian (2007-08-08). "Attacks Prompt Update for 'Tor' Anonymity Network". Washington Post. สืบค้นเมื่อ 2007-10-27.
  38. 1 2 Greenberg, Andy (2014-11-07). "Global Web Crackdown Arrests 17, Seizes Hundreds Of Dark Net Domains". Wired. สืบค้นเมื่อ 2015-08-09. This is something we want to keep for ourselves. The way we do this, we can’t share with the whole world, because we want to do it again and again and again.
  39. 1 2 Wakefield, Jane (2014-11-07). "Huge raid to shut down 400-plus dark net sites -". BBC News. สืบค้นเมื่อ 2015-08-09.
  40. "Announcing Shari Steele as our new executive director". torproject.org. 2015-11-11. สืบค้นเมื่อ 2015-12-12.
  41. Detsch, Jack (2016-04-08). "Tor aims to grow amid national debate over digital privacy: The Tor Project's new executive director Shari Steele is on a mission to change the image of the group's anonymous browser and make its 'clunky and hard to use' technology more user-friendly". Christian Science Monitor. สืบค้นเมื่อ 2016-05-09.
  42. "Tor Project installs new board of directors after Jacob Appelbaum controversy". The Verge. 2016-07-13.
  43. "The Tor Project Elects New Board of Directors". Tor.org. July 13, 2016.
  44. Owen, Gareth. "Dr Gareth Owen: Tor: Hidden Services and Deanonymisation". สืบค้นเมื่อ 2015-06-20.
  45. Moore, Daniel. "Cryptopolitik and the Darknet". Survival: Global Politics and Strategy. สืบค้นเมื่อ 2016-03-20.
  46. Cox, Joseph (2016-02-01). "Study Claims Dark Web Sites Are Most Commonly Used for Crimes". สืบค้นเมื่อ 2016-03-20.
  47. Zetter, Kim (2005-05-17). "Tor Torches Online Tracking". Wired. สืบค้นเมื่อ 2014-08-30.
  48. 1 2 Gregg, Brandon (2012-04-30). "How online black markets work". CSO Online. สืบค้นเมื่อ 2012-08-06.
  49. Morisy, Michael (2012-06-08). "Hunting for child porn, FBI stymied by Tor undernet". Muckrock. สืบค้นเมื่อ 2012-08-06.
  50. Lawrence, Dune (2014-01-23). "The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built". Bloomberg Businessweek. สืบค้นเมื่อ 2014-04-28.
  51. Cochrane, Nate (2011-02-02). "Egyptians turn to Tor to organise dissent online". SC Magazine. สืบค้นเมื่อ 2011-12-10.
  52. "Bitcoin: Monetarists Anonymous". The Economist. 2012-09-29. สืบค้นเมื่อ 2013-05-19.
  53. Boiten, Eerke; Hernandez-Castro, Julio (2014-07-28). "Can you really be identified on Tor or is that just what the cops want you to believe?". Phys.org.
  54. "JTRIG Tools and Techniques". The Intercept. 2014-07-14.
  55. "Document from an internal GCHQ wiki lists tools and techniques developed by the Joint Threat Research Intelligence Group". documentcoud.org. 2012-07-05. สืบค้นเมื่อ 2014-07-30.
  56. Bode, Karl (2007-03-12). "Cleaning up Tor". Broadband.com. สืบค้นเมื่อ 2014-04-28.
  57. Jones, Robert (2005). Internet forensics. O'Reilly. p. 133. ISBN 0-596-10006-X.
  58. Chen, Adrian (2012-06-11). "'Dark Net' Kiddie Porn Website Stymies FBI Investigation". Gawker. สืบค้นเมื่อ 2012-08-06.
  59. Chen, Adrian (2011-06-01). "The Underground Website Where You Can Buy Any Drug Imaginable". Gawker. สืบค้นเมื่อ 2012-04-20.
  60. Steinberg, Joseph (2015-01-08). "How Your Teenage Son or Daughter May Be Buying Heroin Online". Forbes. สืบค้นเมื่อ 2015-02-06.
  61. Goodin, Dan (2012-04-16). "Feds shutter online narcotics store that used TOR to hide its tracks". Ars Technica. สืบค้นเมื่อ 2012-04-20.
  62. "Treasury Dept: Tor a Big Source of Bank Fraud". Krebs on Security. 2014-12-05.
  63. Farivar, Cyrus (2015-04-03). "How a $3.85 latte paid for with a fake $100 bill led to counterfeit kingpin's downfall". Ars Technica. สืบค้นเมื่อ 2015-04-19.
  64. Cimpanu, Catalin (2017-04-06). "New Malware Intentionall Bricks IoT Devices". BleepingComputer.
  65. Moore, Daniel; Rid, Thomas (February 2016). "Cryptopolitik and the Darknet". Survival. 58 (1). Results.CS1 maint: ref=harv (link)
  66. Moore & Rid (2016) "The results suggest that the most common uses for websites on Tor hidden services are criminal, including drugs, illicit finance and pornography involving violence, children and animals. "
  67. Moore & Rid (2016), Saving crypto from itself
  68. Turner, Serrin (2013-09-27). "Sealed compaint" (PDF). United States of America v. Ross William Ulbricht. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม (PDF) เมื่อ 2013-10-02.
  69. Higgins, Parker (2013-10-03). "In the Silk Road Case, Don't Blame the Technology". Electronic Frontier Foundation. สืบค้นเมื่อ 2013-12-22.
  70. Soghoian, Chris (2007-09-16). "Tor anonymity server admin arrested". CNET News. สืบค้นเมื่อ 2011-01-17.
  71. "Surveillance Self-Defense: Tor". Electronic Frontier Foundation. สืบค้นเมื่อ 2014-04-28.
  72. 1 2 Harris, Shane; Hudson, John (2014-10-04). "Not Even the NSA Can Crack the State Department's Favorite Anonymous Service". Foreign Policy. สืบค้นเมื่อ 2014-08-30. so secure that even the world's most sophisticated electronic spies haven't figured out how to crack it
  73. 1 2 Dredge, Stuart (2013-11-05). "What is Tor? A beginner's guide to the privacy tool". The Guardian. สืบค้นเมื่อ 2014-04-28.
  74. Fowler, Geoffrey A. (2012-12-17). "Tor: An Anonymous, And Controversial, Way to Web-Surf". The Wall Street Journal. สืบค้นเมื่อ 2014-08-30.
  75. LeVines, George (2014-05-07). "As domestic abuse goes digital, shelters turn to counter-surveillance with Tor". Boston Globe. สืบค้นเมื่อ 2014-05-08.
  76. Ellis, Justin (2014-06-05). "The Guardian introduces SecureDrop for document leaks". Nieman Journalism Lab. สืบค้นเมื่อ 2014-08-30.
  77. O'Neill, Patrick Howell (2015-03-09). "U.K. Parliament says banning Tor is unacceptable and impossible". The Daily Dot. สืบค้นเมื่อ 2015-04-19.
  78. Kelion, Leo (2014-08-22). "NSA and GCHQ agents 'leak Tor bugs', alleges developer". BBC News.
  79. "Doesn't Tor enable criminals to do bad things?". Tor Project. สืบค้นเมื่อ 2013-08-28.
  80. "Tor: Bridges". Tor Project. สืบค้นเมื่อ 2011-01-09.
  81. Dingledine, Mathewson & Syverson (2004), 4.1 cells: Relay Cells "When an OR later replies to Alice with a relay cell, it encrypts the cell’s relay header and payload with the single key it shares with Alice, and sends the cell back toward Alice along the circuit. Subsequent ORs add further layers of encryption as they relay the cell back to Alice."
  82. "Configuring Hidden Services for Tor". Tor Project. สืบค้นเมื่อ 2011-01-09.
  83. Mathewson, Nick. "Add first draft of rendezvous point document". Tor Source Code. สืบค้นเมื่อ 2016-09-23.
  84. ?verlier, Lasse; Syverson, Paul (2006-06-21). "Locating Hidden Servers" (PDF). Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE Symposium on Security and Privacy. Oakland, CA: IEEE CS Press. p. 1. doi:10.1109/SP.2006.24. ISBN 0-7695-2574-1. สืบค้นเมื่อ 2013-11-09.
  85. 1 2 "Tor: Hidden Service Protocol, Hidden services". Tor Project. สืบค้นเมื่อ 2011-01-09.
  86. Goodin, Dan (2007-09-10). "Tor at heart of embassy passwords leak". The Register. สืบค้นเมื่อ 2007-09-20.
  87. Cox, Joseph (2016-04-06). "A Tool to Check If Your Dark Web Site Really Is Anonymous: 'OnionScan' will probe dark web sites for security weaknesses". Motherboard. สืบค้นเมื่อ 2017-07-07.
  88. Zetter, Kim (2008-12-12). "New Service Makes Tor Anonymized Content Available to All". Wired. สืบค้นเมื่อ 2014-02-22.
  89. Koebler, Jason (2015-02-23). "The Closest Thing to a Map of the Dark Net: Pastebin". Motherboard. สืบค้นเมื่อ 2015-07-14.
  90. "ARM Official Website".
  91. "Tor Project: Arm". torproject.org.
  92. "Ubuntu Manpage: arm - Terminal Tor status monitor". Ubuntu.com.
  93. "Summer Conclusion (ARM Project)". torproject.org. สืบค้นเมื่อ 2015-04-19.
  94. "Interview with Damien Johnson by Brenno Winter". atagar.com. สืบค้นเมื่อ 2016-06-04.
  95. Dingledine, Roger (2009-02-18). "One cell is enough to break Tor's anonymity". Tor Project. สืบค้นเมื่อ 2011-01-09.
  96. "TheOnionRouter/TorFAQ". สืบค้นเมื่อ 2007-09-18. Tor (like all current practical low-latency anonymity designs) fails when the attacker can see both ends of the communications channel
  97. Herrmann, Dominik; Wendolsky, Rolf; Federrath, Hannes (2009-11-13). "Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Na?ve-Bayes Classifier" (PDF). Proceedings of the 2009 ACM Cloud Computing Security Workshop (CCSW). Cloud Computing Security Workshop. New York, USA: Association for Computing Machinery. สืบค้นเมื่อ 2010-09-02.
  98. Judge, Peter (2013-08-20). "Zmap's Fast Internet Scan Tool Could Spread Zero Days In Minutes". TechWeek Europe. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม เมื่อ 2017-06-25. สืบค้นเมื่อ 2014-04-28. Unknown parameter |deadurl= ignored (help)
  99. 1 2 Murdoch, Steven J.; Danezis, George (2006-01-19). "Low-Cost Traffic Analysis of Tor" (PDF). สืบค้นเมื่อ 2007-05-21.
  100. "The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications" (PDF). สืบค้นเมื่อ 2017-01-04. anonymization solutions protect only partially against target selection that may lead to efficient surveillance... do not hide the volume information necessary to do target selection Cite journal requires |journal= (help)
  101. Zetter, Kim (2007-09-10). "Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise". Wired. สืบค้นเมื่อ 2007-09-16.
  102. Lemos, Robert (2007-03-08). "Tor hack proposed to catch criminals". SecurityFocus.
  103. 1 2 Gray, Patrick (2007-11-13). "The hack of the year". Sydney Morning Herald. สืบค้นเมื่อ 2014-04-28.
  104. "Tor anonymizing network compromised by French researchers". The Hacker News. 2011-10-24. สืบค้นเมื่อ 2011-12-10.
  105. "Des chercheurs Francais cassent le reseau d'anonymisation Tor". 01net.com (ภาษาฝรั่งเศส). สืบค้นเมื่อ 2011-10-17.
  106. phobos (2011-10-24). "Rumors of Tor's compromise are greatly exaggerated". Tor Project. สืบค้นเมื่อ 2012-04-20.
  107. Akhoondi, Masoud; Yu, Curtis; Madhyastha, Harsha V. (May 2012). LASTor: A Low-Latency AS-Aware Tor Client (PDF). IEEE Symposium on Security and Privacy. Oakland, USA. สืบค้นเมื่อ 2014-04-28.
  108. 1 2 3 4 5 Manils, Pere; Abdelberri, Chaabane; Le Blond, Stevens; Kaafar, Mohamed Ali; Castelluccia, Claude; Legout, Arnaud; Dabbous, Walid (April 2010). Compromising Tor Anonymity Exploiting P2P Information Leakage (PDF). 7th USENIX Symposium on Network Design and Implementation. arXiv:1004.1461. Bibcode:2010arXiv1004.1461M.
  109. 1 2 3 4 Le Blond, Stevens; Manils, Pere; Chaabane, Abdelberi; Ali Kaafar, Mohamed; Castelluccia, Claude; Legout, Arnaud; Dabbous, Walid (March 2011). One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users (PDF). 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11). National Institute for Research in Computer Science and Control. สืบค้นเมื่อ 2011-04-13.
  110. McCoy, Damon; Bauer, Kevin; Grunwald, Dirk; Kohno, Tadayoshi; Sicker, Douglas (2008). "Shining Light in Dark Places: Understanding the Tor Network" (PDF). Proceedings of the 8th International Symposium on Privacy Enhancing Technologies. 8th International Symposium on Privacy Enhancing Technologies. Berlin, Germany: Springer-Verlag. pp. 63–76. doi:10.1007/978-3-540-70630-4_5. ISBN 978-3-540-70629-8.
  111. 1 2 Samson, Ted (2013-08-05). "Tor Browser Bundle for Windows users susceptible to info-stealing attack". InfoWorld. สืบค้นเมื่อ 2014-04-28.
  112. 1 2 Poulsen, Kevin (2013-08-05). "Feds Are Suspects in New Malware That Attacks Tor Anonymity". Wired. สืบค้นเมื่อ 2014-04-29.
  113. 1 2 Owen, Gareth (2013-08-08). "FBI Malware Analysis". คลังข้อมูลเก่า เก็บจาก แหล่งเดิม เมื่อ 2017-06-10. สืบค้นเมื่อ 2014-05-06. Unknown parameter |deadurl= ignored (help)[แหล่งข้อมูลที่ตีพิมพ์เอง?]
  114. Jansen, Rob; Tschorsch, Florian; Johnson, Aaron; Scheuermann, Bj?rn (2014). The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network (PDF). 21st Annual Network & Distributed System Security Symposium. สืบค้นเมื่อ 2014-04-28.
  115. Dingledine, Roger (2014-04-07). "OpenSSL bug CVE-2014-0160". Tor Project. สืบค้นเมื่อ 2014-04-28.
  116. Dingledine, Roger (2014-04-16). "Rejecting 380 vulnerable guard/exit keys". tor-relays mailing list. https://lists.torproject.org/pipermail/tor-relays/2014-April/004336.html. เรียกข้อมูลเมื่อ 2014-04-28. 
  117. Lunar (2014-04-16). "Tor Weekly News — 16 April 2014". Tor Project. สืบค้นเมื่อ 2014-04-28.
  118. Gallagher, Sean (2014-04-18). "Tor network's ranks of relay servers cut because of Heartbleed bug". Ars Technica. สืบค้นเมื่อ 2014-04-28.
  119. Mimoso, Michael (2014-04-17). "Tor begins blacklisting exit nodes vulnerable to Heartbleed". Threat Post. สืบค้นเมื่อ 2014-04-28.
  120. Dingledine (2014) "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services."
  121. Dingledine (2014) "...we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services... users who operated or accessed hidden services from early February through July 4 should assume they were affected... We know the attack looked for users who fetched hidden service descriptors... The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service... Hidden service operators should consider changing the location of their hidden service."
  122. Dingledine (2014) "Relays should upgrade to a recent Tor release (0.2.4.23 or 0.2.5.6-alpha), to close the particular protocol vulnerability the attackers used..."
  123. Dingledine (2014) "For expert users, the new Tor version warns you in your logs if a relay on your path injects any relay-early cells: look for the phrase 'Received an inbound RELAY_EARLY cell'"
  124. Dingledine (2014) "Clients that upgrade (once new Tor Browser releases are ready) will take another step towards limiting the number of entry guards that are in a position to see their traffic, thus reducing the damage from future attacks like this one...3) Put out a software update that will (once enough clients have upgraded) let us tell clients to move to using one entry guard rather than three, to reduce exposure to relays over time."
  125. Dingledine (2014) "Hidden service operators should consider changing the location of their hidden service."
  126. Dingledine (2014) "...but remember that preventing traffic confirmation in general remains an open research problem."
  127. O'Neill, Patrick Howell (2014-11-07). "The police campaign to scare everyone off of Tor". The Daily Dot. สืบค้นเมื่อ 2018-06-21.
  128. Knight, Shawn (2014-11-07). "Operation Onymous seizes hundreds of darknet sites, 17 arrested globally". Techspot. สืบค้นเมื่อ 2014-11-08.
  129. Dingledine, Roger (2015-11-11). "Did the FBI Pay a University to Attack Tor Users?". Tor Project. สืบค้นเมื่อ 2015-11-20.
  130. Felten, Ed (2014-07-31). "Why were CERT researchers attacking Tor?". Freedom to Tinker, Center for Information Technology Policy, Princeton University.CS1 maint: uses authors parameter (link)
  131. 1 2 3 Greenberg, Andy. "Agora, the Dark Web's Biggest Drug Market, Is Going Offline". wired.com. สืบค้นเมื่อ 2016-09-13.
  132. Kwon, Albert; AlSabah, Mashael; Lazar, David; Dacier, Marc; Devadas, Srinivas (August 2015). "Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services" (PDF). Usenix. ISBN 978-1-931971-232. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม (PDF) เมื่อ 2018-03-08. Unknown parameter |deadurl= ignored (help)CS1 maint: uses authors parameter (link)
  133. Dingledine, Roger (2015-07-31). "A technical summary of the Usenix fingerprinting paper". สืบค้นเมื่อ 2018-06-21.
  134. Cimpanu, Catalin (2016-03-10). "Tor Users Can Be Tracked Based on Their Mouse Movements". Softpedia. สืบค้นเมื่อ 2016-03-11.
  135. Garanich, Gleb (2016-03-10). "Click bait: Tor users can be tracked by mouse movements". Reuters. สืบค้นเมื่อ 2016-03-10.
  136. Anonymous (2016-03-10). "Tor Users Can Be Tracked Based On Their Mouse Movements". Slashdot. สืบค้นเมื่อ 2016-03-11.
  137. "Tor Browser". The Tor Project. สืบค้นเมื่อ 2016-06-04.
  138. "Tor Browser Bundle". Tor Project. 2014-06-23. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม เมื่อ 2014-06-23. สืบค้นเมื่อ 2017-05-21.
  139. Perry, Mike; Clark, Erinn; Murdoch, Steven (2013-03-15). "The Design and Implementation of the Tor Browser [DRAFT]". Tor Project. สืบค้นเมื่อ 2014-04-28.
  140. Knight, John (2011-09-01). "Tor Browser Bundle-Tor Goes Portable". Linux Journal. สืบค้นเมื่อ 2014-04-28.
  141. Poulsen, Kevin (2014-05-08). "Visit the Wrong Website, and the FBI Could End Up in Your Computer". Wired.
  142. "Feds bust through huge Tor-hidden child porn site using questionable malware". Ars Technica. 2015-07-16.
  143. Podhradsky, Ashley; Miller, Matt; Strochein, Josh (2015-06-29). "NIT Forensic and Reverse Engineering Report, Continued from January 2015: USA v Cottom et al 8:13-cr-00108-JFB-TDT U.S. District Court District of Nebraska" (PDF). คลังข้อมูลเก่า เก็บจาก แหล่งเดิม (PDF) เมื่อ 2016-05-14. Unknown parameter |deadurl= ignored (help)CS1 maint: uses authors parameter (link)
  144. Miller, Matt; Strochein, Josh; Podhradsky, Ashley (2016-05-26). "Reverse Engineering a NIT that Unmasks Tor Users". คลังข้อมูลเก่า เก็บจาก แหล่งเดิม (PDF) เมื่อ 2018-07-30. Unknown parameter |deadurl= ignored (help)CS1 maint: uses authors parameter (link)
  145. "The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users". Wired. 2014-12-16.
  146. "Federal Cybersecurity Director Found Guilty on Child Porn Charges". Wired. 2014-08-26.
  147. "Former Acting HHS Cyber Security Director Sentenced to 25 Years in Prison for Engaging in Child Pornography Enterprise". US Department of Justice. 2015-01-05. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม เมื่อ 2018-07-02. Unknown parameter |deadurl= ignored (help)
  148. "New York Man Sentenced to Six Years in Prison for Receiving and Accessing Child Pornography". US Department of Justice. 2015-12-17. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม เมื่อ 2018-07-05. Unknown parameter |deadurl= ignored (help)
  149. Best, Jessica (2014-01-21). "Man branded 'largest facilitator of child porn on the planet' remanded in custody again". Daily Mirror. สืบค้นเมื่อ 2014-04-29.
  150. Dingledine, Roger (2013-08-05). "Tor security advisory: Old Tor Browser Bundles vulnerable". Tor Project. สืบค้นเมื่อ 2014-04-28.
  151. Poulsen, Kevin (2013-09-13). "FBI Admits It Controlled Tor Servers Behind Mass Malware Attack". Wired. สืบค้นเมื่อ 2013-12-22.
  152. Schneier, Bruce (2013-10-04). "Attacking Tor: how the NSA targets users' online anonymity". The Guardian. สืบค้นเมื่อ 2013-12-22.
  153. 1 2 Singh, Sukhbir (2015-10-29). "Tor Messenger Beta: Chat over Tor, Easily". The Tor Blog. The Tor Project. สืบค้นเมื่อ 2015-10-31.
  154. Singh, Sukhbir (2017-03-31). "Tor Messenger 0.4.0b2 is released". sukhbir's blog. The Tor Project. สืบค้นเมื่อ 2017-04-10.
  155. "Tor Messenger Design Document". The Tor Project. 2015-07-13. สืบค้นเมื่อ 2015-11-22.
  156. "Tor". Vuze. สืบค้นเมื่อ 2010-03-03.
  157. "Bitmessage FAQ". Bitmessage. สืบค้นเมื่อ 2013-07-17.
  158. "About". The Guardian Project. สืบค้นเมื่อ 2011-05-10.
  159. "ChatSecure: Private Messaging". The Guardian Project. สืบค้นเมื่อ 2014-09-20.
  160. "Orbot: Mobile Anonymity + Circumvention". The Guardian Project. สืบค้นเมื่อ 2011-05-10.
  161. "ProxyMob: Firefox Mobile Add-on". The Guardian Project. สืบค้นเมื่อ 2011-05-10.
  162. "Obscura: Secure Smart Camera". The Guardian Project. สืบค้นเมื่อ 2014-09-19.
  163. Жуков, Антон (2009-12-15). "Включаем Tor на всю катушку" [Make Tor go the whole hog]. Xakep. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม เมื่อ 2013-09-01. สืบค้นเมื่อ 2014-04-28. Unknown parameter |deadurl= ignored (help)
  164. Brandom, Russell (2014-05-09). "Domestic violence survivors turn to Tor to escape abusers". The Verge. สืบค้นเมื่อ 2014-08-30.
  165. Gurnow, Michael (2014-07-01). "Seated Between Pablo Escobar and Mahatma Gandhi: The Sticky Ethics of Anonymity Networks". Dissident Voice. สืบค้นเมื่อ 2014-07-17.
  166. Lawrence, Dune (2014-01-23). "The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built". Businessweek magazine. สืบค้นเมื่อ 2014-08-30.
  167. Zetter, Kim (2010-06-01). "WikiLeaks Was Launched With Documents Intercepted From Tor". Wired. สืบค้นเมื่อ 2014-08-30. a sophisticated privacy tool
  168. Lee, Timothy B. (2013-06-10). "Five ways to stop the NSA from spying on you". Washington Post. สืบค้นเมื่อ 2014-08-30.
  169. Norton, Quinn (2014-12-09). "Clearing the air around Tor". PandoDaily.
  170. McKim, Jenifer B. (2012-03-08). "Privacy software, criminal use". The Boston Globe. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม เมื่อ 2012-03-12.
  171. Fowler, Geoffrey A. (2012-12-17). "Tor: an anonymous, and controversial, way to web-surf". Wall Street Journal. สืบค้นเมื่อ 2013-05-19.
  172. Fung, Brian (2013-09-06). "The feds pay for 60 percent of Tor's development. Can users trust it?". The Switch. Washington Post. สืบค้นเมื่อ 2014-02-06.
  173. "Tor is Not as Safe as You May Think". Infosecurity magazine. 2013-09-02. สืบค้นเมื่อ 2014-08-30.
  174. "'Tor Stinks' presentation - read the full document". The Guardian. 2014-10-04. สืบค้นเมื่อ 2014-08-30. We will never be able to de-anonymize all Tor users all the time", but "with manual analysis we can de-anonymize a very small fraction of Tor users
  175. O'Neill, Patrick Howell (2014-10-02). "The real chink in Tor's armor". The Daily Dot.
  176. SPIEGEL Staff (2014-12-28). "Prying Eyes: Inside the NSA's War on Internet Security". Der Spiegel. สืบค้นเมื่อ 2015-01-23.
  177. "Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not" (PDF). Der Spiegel. 2014-12-28. สืบค้นเมื่อ 2015-01-23.
  178. "2010 Free Software Awards announced". Free Software Foundation. สืบค้นเมื่อ 2011-03-23.
  179. Wittmeyer, Alicia P.Q. (2012-11-26). "The FP Top 100 Global Thinkers". Foreign Policy. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม เมื่อ 2012-11-28. สืบค้นเมื่อ 2012-11-28. Unknown parameter |deadurl= ignored (help)
  180. Sirius, R. U. (2013-03-11). "Interview uncut: Jacob Appelbaum". theverge.com.
  181. Gaertner, Joachim (2013-07-01). "Darknet - Netz ohne Kontrolle". Das Erste (ภาษาเยอรมัน). สืบค้นเมื่อ 2013-08-28.
  182. Gallagher, Sean (2014-07-25). "Russia publicly joins war on Tor privacy with $111,000 bounty". Ars Technica. สืบค้นเมื่อ 2014-07-26.
  183. Lucian, Constantin (2014-07-25). "Russian government offers huge reward for help unmasking anonymous Tor users". PC World. สืบค้นเมื่อ 2014-07-26.
  184. O'Neill, Patrick Howell (2015-03-26). "Tor's great rebranding". The Daily Dot. สืบค้นเมื่อ 2015-04-19.
  185. Peterson, Andrea (2015-05-28). "U.N. report: Encryption is important to human rights — and backdoors undermine it". The Washington Post.
  186. "Tor Exit Nodes in Libraries - Pilot (phase one)". Tor Project.org. สืบค้นเมื่อ 2015-09-15.
  187. "Library Freedom Project". libraryfreedomproject.org. สืบค้นเมื่อ 2015-09-15.
  188. Doyle-Burr, Nora (2015-09-16). "Despite Law Enforcement Concerns, Lebanon Board Will Reactivate Privacy Network Tor at Kilton Library". Valley News. สืบค้นเมื่อ 2015-11-20.
  189. "Lofgren questions DHS policy towards TOR Relays". house.gov. 2015-12-10. สืบค้นเมื่อ 2016-06-04.
  190. Geller, Eric (2015-12-11). "Democratic lawmaker wants to know if DHS is sabotaging plans for Tor exit relays". The Daily Dot. สืบค้นเมื่อ 2016-06-04.
  191. Kopstein, Joshua (2015-12-12). "Congresswoman Asks Feds Why They Pressured a Library to Disable Its Tor Node". Motherboard. คลังข้อมูลเก่า เก็บจาก แหล่งเดิม เมื่อ 2015-12-22. Unknown parameter |dead-url= ignored (help)
  192. Gonzalo, Maril?n (2016-01-26). "Esta biblioteca valenciana es la segunda del mundo en unirse al proyecto Tor". El Diario (ภาษาสเปน). สืบค้นเมื่อ 2016-03-04.
  193. Broersma, Matthew (2015-08-26). "IBM Tells Companies To Block Tor Anonymisation Network". TechWeekEurope UK. สืบค้นเมื่อ 2015-09-15.
  194. Greenberg, Andy (2015-09-14). "Mapping How Tor's Anonymity Network Spread Around the World". Wired. สืบค้นเมื่อ 2016-02-09.
  195. Malivindi, Diandra (2015-09-15). "The New Map That Tracks Your TOR Activity". GQ Australia. สืบค้นเมื่อ 2016-02-09.
  196. "House Bill 1508: An Act allowing public libraries to run certain privacy software". New Hampshire State Government. 2016-03-10. สืบค้นเมื่อ 2016-06-04.
  197. O'Neill, Patrick Howell (2016-02-18). "New Hampshire bill allows for libraries' usage of encryption and privacy software". The Daily Dot. สืบค้นเมื่อ 2016-03-10.
  198. "New Hampshire HB1508 - 2016 - Regular Session". legiscan.com. สืบค้นเมื่อ 2016-06-04.
  199. "Library in FIMS joins global network fighting back against digital surveillance, censorship, and the obstruction of information". FIMS News. 2016-03-14. สืบค้นเมื่อ 2016-03-16.
  200. Pagliery, Jose (2016-05-17). "Developer of anonymous Tor software dodges FBI, leaves US". CNN. สืบค้นเมื่อ 2016-05-17.
  201. Weiner, Anna (2016-12-02). "Trump Preparedness: Digital Security 101".
  202. "Want Tor to Really Work?". Tor Project.
  203. 1 2 "Tor: Overview - Staying anonymous". สืบค้นเมื่อ 2016-09-21.
  204. 1 2 "Building a new Tor that can resist next-generation state surveillance". arstechnica.com. สืบค้นเมื่อ 2016-09-13.
  205. "Clinton feared hack after getting porn link sent to her secret email". dailymail.co.uk. สืบค้นเมื่อ 2016-09-13.
  206. "Aussie cops ran child porn site for months, revealed 30 US IPs". arstechnica.com. สืบค้นเมื่อ 2016-09-13.

แหล่งที่มา

WikiPedia: ทอร์_(เครือข่ายนิรนาม) http://50.21.181.236/congress/2015/h264-sd/32c3-73... http://www.gq.com.au/entertainment/tech/the+new+ma... http://www.scmagazine.com.au/News/246707,egyptians... http://www.smh.com.au/news/security/the-hack-of-th... http://www.fims.uwo.ca/news/2016/library_in_fims_j... http://pro.01net.com/editorial/544024/des-chercheu... http://arstechnica.com/security/2014/04/tor-networ... http://arstechnica.com/security/2014/07/russia-pub... http://arstechnica.com/security/2014/07/tor-develo... http://arstechnica.com/security/2016/08/building-a...