Security and privacy researchers are increasingly taking an interest in the Tor network, and have even performed studies that involved intercepting the network communications of Tor users. There are currently no generally agreed upon community norms for research on Tor users, and so unfortunately, several projects have engaged in problematic behavior - not because the researchers had malicious intent, but because they simply did not see the ethical or legal issues associated with their data gathering. This paper proposes a set of four bright-line rules for researchers conducting privacy invading research on the Tor network. The author hopes that it will spark a debate, and hopefully lead to responsible program committees taking some action to embrace these, or similar rules. © 2012 Springer-Verlag.
CITATION STYLE
Soghoian, C. (2012). Enforced community standards for research on users of the Tor anonymity network. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7126 LNCS, pp. 146–153). https://doi.org/10.1007/978-3-642-29889-9_13
Mendeley helps you to discover research relevant for your work.