Network+performance+traffic

Showing results 1 to 20 of 366

Who's on Tor? Dissent, bots or porn?

Researchers who found a vulnerability in the protocols used in the Tor anonymous Internet service used it to survey the traffic on the network. They found that "…while the content of Tor hidden services is rather varied, the most popular hidden services are related to botnets."

September 16, 2013 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories