During the last few decades we have seen a tremendous number of activities (and publications) regarding anonymous communication systems, how to make them better, various attacks, defenses etc. Even though the implicit assumption of any anonymity work is to have it applied in a real world, few of th…
During the last few decades we have seen a tremendous number of activities (and publications) regarding anonymous communication systems, how to make them better, various attacks, defenses etc. Even though the implicit assumption of any anonymity work is to have it applied in a real world, few of those activities focus on actual practical systems, and the questions remain if we are doing research on the right thing? how far we are from dealing with the real issues? and are the goals that we try to achieve with these systems those that we are optimizing for?
This workshop solicits papers concerned with what happens on top of and around the anonymizing layer, with a view of how this affects the anonymity system. That is in some ways the user's, operator's, ISP's, etc. view of and experience with anonymity systems and how anonymity systems need to be improved.