- 2015092903.
Retrieved 12 July 2024. Rouse, Margaret. "de-anonymization (
deanonymization)". WhatIs.com.
Retrieved 19
January 2014. Narayanan, Arvind; Shmatikov...
- and
email addresses which could be used in
phishing attacks or used to
deanonymize accounts running under pseudonyms.
During an outage,
Twitter users were...
-
reporting su****ious
activity on
their server,
suspecting some kind of
deanonymization bug in Tor. By
October 2015,
AlphaBay was
recognized as the largest...
- (2013), "Trawling for Tor
Hidden Services: Detection, Measurement,
Deanonymization" (PDF),
Symposium on
Security and Privacy, IEEE "Ballot 144". CA/Browser...
- the site
against potential attacks that they
believed might be used to
deanonymize server locations:
Recently research had come [sic] that shed some light...
- or
censor online communication), or
another group. Fundamentally,
deanonymization can be
divided into two categories:
Social correlation compares known...
-
February 9, 2025. Nina
Bambysheva (July 24, 2023). "This
Startup Wants To
Deanonymize Blockchain.
Privacy Advocates Are Furious". Forbes.
Retrieved April 21...
-
November 18, 2021 Nina
Bambysheva (July 24, 2023). "This
Startup Wants To
Deanonymize Blockchain.
Privacy Advocates Are Furious". Forbes.
Retrieved June 21...
-
anonymity and
privacy researcher with
published research in the
fields of
deanonymization and e-voting. In 2019,
Lewis in
collaboration with
researchers from...
-
Operation Lobos 1, and to the
German Bundeskriminalamt (BKA) in a Tor
deanonymization project as a
dragnet of the
administrators and
users of the websites:...