Abstract
Users face security folklore in their daily lives in the form of security advice, myths, and word-of-mouth stories. Using a VPN to access the Tor network, i.e., Tor over VPN, is an interesting example of security folklore because of its inconclusive security benefits and its occurrence in pop-culture media. Following the Theory of Reasoned Action, we investigated the phenomenon with three studies: (1) we quantified the behavior on real-world Tor traffic and measured a prevalence of 6.23%; (2) we surveyed users' intentions and beliefs, discovering that they try to protect themselves from the Tor network or increase their general security; and (3) we analyzed online information sources, suggesting that perceived norms and ease-of-use play a significant role while behavioral beliefs about the purpose and effect are less crucial in spreading security folklore. We discuss how to communicate security advice effectively and combat security misinformation and misconceptions.
Author supplied keywords
Cite
CITATION STYLE
Fassl, M., Ponticello, A., Dabrowski, A., & Krombholz, K. (2023). Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon. Proceedings of the ACM on Human-Computer Interaction, 7(CSCW2). https://doi.org/10.1145/3610193
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.