In recent years, interest has shifted from protecting the confidentiality of data to protecting the confidentiality of metadata. The police often learn more from traffic analysis than from content interception; thus anonymity becomes more important than confidentiality in the classical sense. Many researchers have been working with systems such as remailers and Tor in order to provide anonymity of various kinds against various threats.
CITATION STYLE
Anderson, R., & Murdoch, S. J. (2011). What Next after Anonymity? (pp. 220–222). https://doi.org/10.1007/978-3-642-22137-8_29
Mendeley helps you to discover research relevant for your work.