About
11
Publications
1,135
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
77
Citations
Current institution
Publications
Publications (11)
The darknet terminology is not used consistently among scientific research papers. This can lead to difficulties in regards to the applicability and the significance of the results and also facilitates misinterpretation of them. As a consequence, comparisons of the different works are complicated. In this paper, we conduct a review of previous dark...
Descriptives of the darknet, and in particular of the Tor network, appear inconsistent and implausible in nature. In order to gain insight into how these conflicting results are produced, the goal of this study is to review previous research on the matter with regard to terminology used, methodology of sample collection and the analysis of the data...
Single-vendor shops are darknet marketplaces where individuals offer their own goods or services on their own darknet website. There are many single-vendor shops with a wide range of offers in the Tor-network. This paper presents a method to find similarities between these vendor websites to discover possible operational structures between them. In...
Zusammenfassung
Eine anonyme Nutzung des Internets wird durch die Verwendung sogenannter „Darknet-Technologien“ wie der Tor-Software ermöglicht und ist hierzulande grundrechtlich geschützt. Neben zahlreichen positiven Verwendungszwecken werden solche Technologien allerdings oft auch zur anonymen Begehung von Straftaten eingesetzt. Da ein Verbot von...
Zusammenfassung
Ziel der vorliegenden Arbeit ist die Erstellung einer Anonymitätsmatrix. Der Fokus liegt hierbei insbesondere in der Verbindung der technischen und psychologischen Komponenten der Betrachtung. Ausgangssituation ist die Verwendung einer Privacy Enhancing Technology, konkret dem Tor-Browser. So ist das Ziel, die Tor-Nutzergruppe in Be...
Tor is a widely-used anonymity network with more than two million daily users. A prominent feature of Tor is the hidden service architecture. Hidden services are a popular method for communicating anonymously or sharing web contents anonymously. For security reasons, in Tor all data packets to be send over the network are structured completely iden...
Conducting data analysis and system monitoring in a privacy-preserving manner is extremely important for anonymity systems such as the distributed publication system Freenet. The current obfuscation mechanisms for gathering statistics in Freenet are designed to anonymize both the responding node and the response itself. We show that due to the poss...