README.md

This commit is contained in:
Michael Mirzai 2020-12-11 11:00:44 +01:00
parent 5f184d83d6
commit 00f53f6e66
1 changed files with 39 additions and 39 deletions

View File

@ -17,42 +17,42 @@
| 🖹 | 🖹 |
| --- | --- |
| 2004 | [Punishing the Innocent along with the Guilty The Economics of Individual versus Group Punishment](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2004-Punishing_the_Innocent_along_with_the_Guilty_The_Economics_of_Individual_versus_Group_Punishment.pdf) |
| 2004 | [Tor The Second-Generation Onion Router](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2004-Tor_The_Second-Generation_Onion_Router.pdf) |
| 2006 | [UK NISCC Telecommunications Resilience](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2006-UK_NISCC_Telecommunications_Resilience.pdf) |
| 2008 | [Shining Light in Dark Places Understanding the Tor Network](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2008-Shining_Light_in_Dark_Places_Understanding_the_Tor_Network.pdf) |
| 2010 | [Digging into Anonymous Traffic deep analysis of the Tor anonymizing network](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2010-Digging_into_Anonymous_Traffic_deep_analysis_of_the_Tor_anonymizing_network.pdf) |
| 2012 | [TorScan Tracing Long-lived Connections and Differential Scanning Attacks](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2012-TorScan_Tracing_Long-lived_Connections_and_Differential_Scanning_Attacks.pdf) |
| 2013 | [Trawling for Tor Hidden Services Detection Measurement Deanonymization](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2013-Trawling_for_Tor_Hidden_Services_Detection_Measurement_Deanonymization.pdf) |
| 2013 | [Users Get Routed Traffic Correlation on Tor by Realistic Adversaries](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2013-Users_Get_Routed_Traffic_Correlation_on_Tor_by_Realistic_Adversaries.pdf) |
| 2014 | [EU WP216 Article 29 Data Protection Working Party](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2014-euWP216_Article_29_Data_Protection_Working_Party.pdf) |
| 2014 | [Effective Attacks and Provable Defenses for Website Fingerprinting](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2014-Effective_Attacks_and_Provable_Defenses_for_Website_Fingerprinting.pdf) |
| 2014 | [Identity Theft Threat and Mitigations](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2014-Identity_Theft_Threat_and_Mitigations.pdf) |
| 2014 | [InTeRneT SpyIng In SAn FRAnCISCo](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2014-InTeRneT_SpyIng_In_SAn_FRAnCISCo.pdf) |
| 2014 | [Practical Attacks Against The I2P Network](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2014-Practical_Attacks_Against_The_I2P_Network.pdf) |
| 2014 | [When HTTPS Meets CDN](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2014-When_HTTPS_Meets_CDN.pdf) |
| 2015 | [HHRG-114-FA18-Transcript](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2015-HHRG-114-FA18-Transcript.pdf) |
| 2015 | [Passive Deanonymization of Tor Hidden Services](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2015-Passive_Deanonymization_of_Tor_Hidden_Services.pdf) |
| 2016 | [BLACR TTP-Free Blacklistable Anonymous Credentials with Reputation](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2016-BLACR_TTP-Free_Blacklistable_Anonymous_Credentials_with_Reputation.pdf) |
| 2016 | [CloudFlare Fact Sheet](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2016-CloudFlare_Fact_Sheet.pdf) |
| 2016 | [Differential Treatment of Anonymous Users](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2016-Differential_Treatment_of_Anonymous_Users.pdf) |
| 2016 | [I Am Robot Deep Learning to Break Semantic Image CAPTCHAs](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2016-I_Am_Robot_Deep_Learning_to_Break_Semantic_Image_CAPTCHAs.pdf) |
| 2016 | [Learning to Break Semantic Image CAPTCHAs](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2016-Learning_to_Break_Semantic_Image_CAPTCHAs.pdf) |
| 2016 | [The Crime of Speech How Arab Governments Use the Law to Silence Expression Online](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2016-The_Crime_of_Speech_How_Arab_Governments_Use_the_Law_to_Silence_Expression_Online.pdf) |
| 2016 | [US Playpen Tor](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2016-US_Playpen_Tor.pdf) |
| 2017 | [DHS FBI Playpen](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2017-DHS_FBI_Playpen.pdf) |
| 2017 | [The Security Impact of HTTPS Interception](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2017-The_Security_Impact_of_HTTPS_Interception.pdf) |
| 2017 | [USCourtCase 16 3976](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2017-USCourtCase_16_3976.pdf) |
| 2018 | [403 Forbidden A Global View of CDN Geoblocking](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2018-403_Forbidden_A_Global_View_of_CDN_Geoblocking.pdf) |
| 2018 | [Cloud Security Basics](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2018-Cloud_Security_Basics.pdf) |
| 2018 | [Robust Website Fingerprinting Through the Cache Occupancy Channel](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2018-Robust_Website_Fingerprinting_Through_the_Cache_Occupancy_Channel.pdf) |
| 2018 | [The Death of Transit and the Future Internet](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2018-The_Death_of_Transit_and_the_Future_Internet.pdf) |
| 2019 | [Analyzing Chinas Blocking of Unpublished Tor Bridges](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2019-Analyzing_Chinas_Blocking_of_Unpublished_Tor_Bridges.pdf) |
| 2019 | [The Great Cloudwall](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2019-The_Great_Cloudwall.pdf) |
| 2019 | [Thirteen Years of Tor Attacks](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2019-Thirteen_Years_of_Tor_Attacks.pdf) |
| 2019 | [Tor Censorship Arms Race](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2019-Tor_Censorship_Arms_Race.pdf) |
| 2019 | [Watching You Watch The Tracking Ecosystem of Over-the-Top TV Streaming Devices](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2019-Watching_You_Watch_The_Tracking_Ecosystem_of_Over-the-Top_TV_Streaming_Devices.pdf) |
| 2019 | [A First Look at References from the Dark to Surface Web World](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2019-A_First_Look_at_References_from_the_Dark_to_Surface_Web_World.pdf) |
| 2020 | [JosephSullivan CSO](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2020-JosephSullivan_CSO.pdf) |
| 2020 | [Website Fingerprinting with Website Oracles](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2020-Website_Fingerprinting_with_Website_Oracles.pdf) |
| 2020 | [Why We Still Cant Browse in Peace On the Uniqueness and Reidentifiability of Web Browsing Histories](https://codeberg.org/crimeflare/stop_cloudflare/raw/branch/master/pdf/2020-Why_We_Still_Cant_Browse_in_Peace_On_the_Uniqueness_and_Reidentifiability_of_Web_Browsing_Histories.pdf) |
| 2004 | [Punishing the Innocent along with the Guilty The Economics of Individual versus Group Punishment](2004-Punishing_the_Innocent_along_with_the_Guilty_The_Economics_of_Individual_versus_Group_Punishment.pdf) |
| 2004 | [Tor The Second-Generation Onion Router](2004-Tor_The_Second-Generation_Onion_Router.pdf) |
| 2006 | [UK NISCC Telecommunications Resilience](2006-UK_NISCC_Telecommunications_Resilience.pdf) |
| 2008 | [Shining Light in Dark Places Understanding the Tor Network](2008-Shining_Light_in_Dark_Places_Understanding_the_Tor_Network.pdf) |
| 2010 | [Digging into Anonymous Traffic deep analysis of the Tor anonymizing network](2010-Digging_into_Anonymous_Traffic_deep_analysis_of_the_Tor_anonymizing_network.pdf) |
| 2012 | [TorScan Tracing Long-lived Connections and Differential Scanning Attacks](2012-TorScan_Tracing_Long-lived_Connections_and_Differential_Scanning_Attacks.pdf) |
| 2013 | [Trawling for Tor Hidden Services Detection Measurement Deanonymization](2013-Trawling_for_Tor_Hidden_Services_Detection_Measurement_Deanonymization.pdf) |
| 2013 | [Users Get Routed Traffic Correlation on Tor by Realistic Adversaries](2013-Users_Get_Routed_Traffic_Correlation_on_Tor_by_Realistic_Adversaries.pdf) |
| 2014 | [EU WP216 Article 29 Data Protection Working Party](2014-euWP216_Article_29_Data_Protection_Working_Party.pdf) |
| 2014 | [Effective Attacks and Provable Defenses for Website Fingerprinting](2014-Effective_Attacks_and_Provable_Defenses_for_Website_Fingerprinting.pdf) |
| 2014 | [Identity Theft Threat and Mitigations](2014-Identity_Theft_Threat_and_Mitigations.pdf) |
| 2014 | [InTeRneT SpyIng In SAn FRAnCISCo](2014-InTeRneT_SpyIng_In_SAn_FRAnCISCo.pdf) |
| 2014 | [Practical Attacks Against The I2P Network](2014-Practical_Attacks_Against_The_I2P_Network.pdf) |
| 2014 | [When HTTPS Meets CDN](2014-When_HTTPS_Meets_CDN.pdf) |
| 2015 | [HHRG-114-FA18-Transcript](2015-HHRG-114-FA18-Transcript.pdf) |
| 2015 | [Passive Deanonymization of Tor Hidden Services](2015-Passive_Deanonymization_of_Tor_Hidden_Services.pdf) |
| 2016 | [BLACR TTP-Free Blacklistable Anonymous Credentials with Reputation](2016-BLACR_TTP-Free_Blacklistable_Anonymous_Credentials_with_Reputation.pdf) |
| 2016 | [CloudFlare Fact Sheet](2016-CloudFlare_Fact_Sheet.pdf) |
| 2016 | [Differential Treatment of Anonymous Users](2016-Differential_Treatment_of_Anonymous_Users.pdf) |
| 2016 | [I Am Robot Deep Learning to Break Semantic Image CAPTCHAs](2016-I_Am_Robot_Deep_Learning_to_Break_Semantic_Image_CAPTCHAs.pdf) |
| 2016 | [Learning to Break Semantic Image CAPTCHAs](2016-Learning_to_Break_Semantic_Image_CAPTCHAs.pdf) |
| 2016 | [The Crime of Speech How Arab Governments Use the Law to Silence Expression Online](2016-The_Crime_of_Speech_How_Arab_Governments_Use_the_Law_to_Silence_Expression_Online.pdf) |
| 2016 | [US Playpen Tor](2016-US_Playpen_Tor.pdf) |
| 2017 | [DHS FBI Playpen](2017-DHS_FBI_Playpen.pdf) |
| 2017 | [The Security Impact of HTTPS Interception](2017-The_Security_Impact_of_HTTPS_Interception.pdf) |
| 2017 | [USCourtCase 16 3976](2017-USCourtCase_16_3976.pdf) |
| 2018 | [403 Forbidden A Global View of CDN Geoblocking](2018-403_Forbidden_A_Global_View_of_CDN_Geoblocking.pdf) |
| 2018 | [Cloud Security Basics](2018-Cloud_Security_Basics.pdf) |
| 2018 | [Robust Website Fingerprinting Through the Cache Occupancy Channel](2018-Robust_Website_Fingerprinting_Through_the_Cache_Occupancy_Channel.pdf) |
| 2018 | [The Death of Transit and the Future Internet](2018-The_Death_of_Transit_and_the_Future_Internet.pdf) |
| 2019 | [Analyzing Chinas Blocking of Unpublished Tor Bridges](2019-Analyzing_Chinas_Blocking_of_Unpublished_Tor_Bridges.pdf) |
| 2019 | [The Great Cloudwall](2019-The_Great_Cloudwall.pdf) |
| 2019 | [Thirteen Years of Tor Attacks](2019-Thirteen_Years_of_Tor_Attacks.pdf) |
| 2019 | [Tor Censorship Arms Race](2019-Tor_Censorship_Arms_Race.pdf) |
| 2019 | [Watching You Watch The Tracking Ecosystem of Over-the-Top TV Streaming Devices](2019-Watching_You_Watch_The_Tracking_Ecosystem_of_Over-the-Top_TV_Streaming_Devices.pdf) |
| 2019 | [A First Look at References from the Dark to Surface Web World](2019-A_First_Look_at_References_from_the_Dark_to_Surface_Web_World.pdf) |
| 2020 | [JosephSullivan CSO](2020-JosephSullivan_CSO.pdf) |
| 2020 | [Website Fingerprinting with Website Oracles](2020-Website_Fingerprinting_with_Website_Oracles.pdf) |
| 2020 | [Why We Still Cant Browse in Peace On the Uniqueness and Reidentifiability of Web Browsing Histories](2020-Why_We_Still_Cant_Browse_in_Peace_On_the_Uniqueness_and_Reidentifiability_of_Web_Browsing_Histories.pdf) |