1. Fingerprinting attack on Tor anonymity using deep learning;Abe Kota;Proceedings of the Asia-Pacific Advanced Network,2016
2. Daniel Agnew. 2020. Google Trends Reveals Surge in Demand for VPN. https://www.namecheap.com/blog/vpn-surge-in-demand/. Daniel Agnew. 2020. Google Trends Reveals Surge in Demand for VPN. https://www.namecheap.com/blog/vpn-surge-in-demand/.
3. Masoud Akhoondi , Curtis Yu , and Harsha V. Madhyastha . 2012 . LASTor: A Low-Latency AS-Aware Tor Client. In IEEE Symposium on Security and Privacy, SP 2012 , 21--23 May 2012 , San Francisco, California, USA. IEEE Computer Society, 476--490. https://doi.org/10.1109/SP. 2012.35 10.1109/SP.2012.35 Masoud Akhoondi, Curtis Yu, and Harsha V. Madhyastha. 2012. LASTor: A Low-Latency AS-Aware Tor Client. In IEEE Symposium on Security and Privacy, SP 2012, 21--23 May 2012, San Francisco, California, USA. IEEE Computer Society, 476--490. https://doi.org/10.1109/SP.2012.35
4. Mashael AlSabah Kevin Bauer Tariq Elahi and Ian Goldberg. 2013. The path less travelled: Overcoming Tor's bottlenecks with traffic splitting. In PETS. Mashael AlSabah Kevin Bauer Tariq Elahi and Ian Goldberg. 2013. The path less travelled: Overcoming Tor's bottlenecks with traffic splitting. In PETS.
5. Apple. 2021. iCloud Private Relay Overview. https://www.apple.com/privacy/docs/iCloud_Private_Relay _ Overview_Dec2021.PDF. Apple. 2021. iCloud Private Relay Overview. https://www.apple.com/privacy/docs/iCloud_Private_Relay _ Overview_Dec2021.PDF.