Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.
Explores the challenges of protecting location privacy and various techniques to mitigate location-related inferences, highlighting the importance of trust assumptions and practical issues.