How Do Tor Users Interact With Onion Services?

被引:0
|
作者
Winter, Philipp [1 ]
Edmundson, Anne [1 ]
Roberts, Laura M. [1 ]
Dutkowska-Zuk, Agnieszka
Chetty, Marshini [1 ]
Feamster, Nick [1 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Onion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names that are long and difficult for humans to read. In this paper, we study how people perceive, understand, and use onion services based on data from 17 semi-structured interviews and an online survey of 517 users. We find that users have an incomplete mental model of onion services, use these services for anonymity and have varying trust in onion services in general. Users also have difficulty discovering and tracking onion sites and authenticating them. Finally, users want technical improvements to onion services and better information on how to use them. Our findings suggest various improvements for the security and usability of Tor onion services, including ways to automatically detect phishing of onion services, more clear security indicators, and ways to manage onion domain names that are difficult to remember.
引用
收藏
页码:411 / 428
页数:18
相关论文
共 50 条
  • [1] How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services
    Overdorf, Rebekah
    Juarez, Marc
    Acar, Gunes
    Greenstadt, Rachel
    Diaz, Claudia
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2021 - 2036
  • [2] Improving the Privacy of Tor Onion Services
    Eaton, Edward
    Sasy, Sajin
    Goldberg, Ian
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 273 - 292
  • [3] Detection and Analysis of Tor Onion Services
    Steinebach, Martin
    Schafer, Marcel
    Karakuz, Alexander
    Brandl, Katharina
    Yannikos, York
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [4] Recognition of tor malware and onion services
    Bergman, Jesper
    Popov, Oliver B.
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (02) : 261 - 275
  • [5] Recognition of tor malware and onion services
    Jesper Bergman
    Oliver B. Popov
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 261 - 275
  • [6] How do users interact with algorithm recommender systems? The interaction of users, algorithms, and performance
    Shin, Donghee
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2020, 109
  • [7] How do users interact with textual and pictorial elements in Wikipedia articles?
    Roesch, Barbara
    [J]. INFORMATION-WISSENSCHAFT UND PRAXIS, 2015, 66 (01): : 17 - 21
  • [8] How do AI and human users interact? Positioning of AI and human users in customer service
    Ahn, So-Yeon
    Kim, Seonghoon
    Lee, Eun-Young
    Lee, Hyunjong
    Song, Eun-Young
    Song, Junehwa
    Won, Jongseo
    [J]. TEXT & TALK, 2024,
  • [9] How do users interact with Virtual Geographic Environments? Users' behavior evaluation in urban participatory planning
    Chassin, Thibaud
    Ingensand, Jens
    Touya, Guillaume
    Christophe, Sidonie
    [J]. 30TH INTERNATIONAL CARTOGRAPHIC CONFERENCE (ICC 2021), VOL 4, 2021,
  • [10] Bypassing Tor Exit Blocking with Exit Bridge Onion Services
    Zhang, Zhao
    Zhou, Wenchao
    Sherr, Micah
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 3 - 16