Skip to main content

How Do Tor Users Interact With Onion Services?

Author(s): Winter, Philipp; Edmundson, Anne; Roberts, Laura M; Dutkowska-Zuk, Agnieszka; Chetty, Marshini; et al

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1tk1v
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWinter, Philipp-
dc.contributor.authorEdmundson, Anne-
dc.contributor.authorRoberts, Laura M-
dc.contributor.authorDutkowska-Zuk, Agnieszka-
dc.contributor.authorChetty, Marshini-
dc.contributor.authorFeamster, Nick-
dc.date.accessioned2021-10-08T19:49:15Z-
dc.date.available2021-10-08T19:49:15Z-
dc.date.issued2018en_US
dc.identifier.citationWinter, Philipp, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Żuk, Marshini Chetty, and Nick Feamster. "How do Tor users interact with onion services?." In 27th USENIX Security Symposium (2018): pp. 411-428.en_US
dc.identifier.urihttps://www.usenix.org/system/files/conference/usenixsecurity18/sec18-winter.pdf-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1tk1v-
dc.description.abstractOnion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names that are long and difficult for humans to read. In this paper, we study how people perceive, understand, and use onion services based on data from 17 semi-structured interviews and an online survey of 517 users. We find that users have an incomplete mental model of onion services, use these services for anonymity, and have vary- ing trust in onion services in general. Users also have difficulty discovering and tracking onion sites and authenticating them. Finally, users want technical improvements to onion services and better information on how to use them. Our findings suggest various improvements for the security and usability of Tor onion services, including ways to automatically detect phishing of onion services, clearer security indicators, and better ways to manage onion domain names that are difficult to remember.en_US
dc.format.extent411 - 428en_US
dc.language.isoen_USen_US
dc.relation.ispartof27th USENIX Security Symposiumen_US
dc.rightsFinal published version. This is an open access article.en_US
dc.titleHow Do Tor Users Interact With Onion Services?en_US
dc.typeConference Articleen_US
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceedingen_US

Files in This Item:
File Description SizeFormat 
UsersInteractOnion.pdf753.32 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.