Analysis of the Rising Threat of Subverting Privacy Technologies
نویسنده
چکیده
Privacy technologies have become extremely prevalent in recent years from secure communication channels to the Tor network. These technologies were designed to provide privacy and security for users, but these ideals have also led to increased criminal use of the technologies. Privacy and anonymity are always sought after by criminals, making these technologies the perfect vehicles for committing crimes on the Internet. This paper will analyze the rising threat of subverting privacy technologies for criminal or nefarious use. It will look at recent research in this area and ultimately reach conclusions on the seriousness of this issue.
منابع مشابه
Survey Paper on Rising Threats of Subverting Privacy Infrastructure
One of the main challenges faced by a user today is protecting their privacy, especially during widespread surveillance. This led to the development of privacy infrastructures whose main purpose is to guarantee users privacy. However, they are being misused by attackers who consider them to be an exploitable resource to perform illegitimate activities. This paper proposes to analyze and assess ...
متن کاملThe Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review
Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...
متن کاملThe Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review
Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...
متن کاملIdentifying and Ranking Ethical Issues of the Internet of Things in Medical Sciences using Stepwise Weight Assessment Ratio Analysis
Background and Objectives: The Internet of Things (IoT) refers to billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. The IoT has been widely applied to interconnect available medical resources and provide reliable, effective and smart healthcare service to the people. The social acceptance of IoT applications and services stron...
متن کاملThreat Modelling in User Performed Authentication
User authentication can be compromised both by subverting the system and by subverting the user; the threat modelling of the former is well studied, the latter less so. We propose a method to determine opportunities to subvert the user allowing vulnerabilities to be systematically identified. The method is applied to VeriSign’s OpenID authentication mechanism.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1707.01142 شماره
صفحات -
تاریخ انتشار 2017