% Encoding: UTF-8 % % Security % @manual{autodefesa-digital, title = {Guia de Autodefesa Digital}, author = {Silvio Rhatto}, note = {Acessado em 2019-06-08.}, year = {2017}, url = {https://guia.autodefesa.org}, } @book{graham2009, title = {Disrupted Cities: When Infrastructure Fails}, author = {Stephen Graham}, publisher = {}, isbn = {0415991781,041599179X,0203894480,9780415991780,9780415991797,9780203894484}, year = {2009}, series = {}, edition = {1}, volume = {}, } % Using the anonbib format %www_section = comm # and # torperf, @mastersthesis{csucu2015, author = {Sucu, Ceysun}, title = {{Tor}: Hidden Service Scaling}, school = {University College London}, year = {2015}, month = {September}, day = {2}, abstract = {Tor’s hidden services in its current state does not fully utilise multi-core architecture or provide any load balancing options in regards to multi-server systems. This thesis explores possible techniques which could be used in scaling Tor’s hidden services horizontally, more precisely looking at possible load balancing techniques and hidden service resiliency. The first section of the thesis will give an detailed overview of Tor and look at relevant scaling and load balancing techniques. The body of the thesis will experiment with possible techniques and evaluate them. Finally I will indicate the aim of this research and possible future directions.}, www_abstract_url = {https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/}, www_pdf_url = {https://raw.githubusercontent.com/csucu/Tor-Hidden-Service-Scaling/master/Ceysun%20Sucu%20-%20Hidden%20Service%20Scaling.pdf}, url = {https://github.com/csucu/Tor-Hidden-Service-Scaling}, } % https://thebulletin.org/doomsday-clock/current-time/ @misc{bulletin2022, title = {At doom’s doorstep: It is 100 seconds to midnight - 2022 Doomsday Clock Statement}, author = {{Bulletin of the Atomic Scientists}}, year = {2022}, url = {https://thebulletin.org/wp-content/uploads/2022/01/2022-doomsday-clock-statement.pdf}, } % https://thebulletin.org/doomsday-clock/current-time/ @misc{bulletin2024, title = {A moment of historic danger: It is still 90 seconds to midnight}, author = {{Bulletin of the Atomic Scientists}}, year = {2024}, url = {https://thebulletin.org/wp-content/uploads/2024/01/2024-Doomsday-Clock-Statement.pdf}, } @book{ord2020, title = {The Precipice: Existential Risk and the Future of Humanity}, author = {Toby Ord}, publisher = {Hachette Books}, isbn = {0316484911,9780316484916}, year = {2020}, series = {}, edition = {}, volume = {}, url = {https://theprecipice.com}, } @book{rees2004, title = {Our Final Hour: A Scientist's Warning}, author = {Martin Rees}, publisher = {Basic Books}, isbn = {0-465-06862-6}, year = {2004}, series = {}, edition = {}, volume = {}, } @book{bostrom2008, title = {Global Catastrophic Risks}, author = {Nick Bostrom and Milan M. Ćirković}, publisher = {Oxford University Press}, isbn = {9780198570509, 0198570503}, year = {2008}, series = {}, edition = {}, volume = {}, } @book{gehl2018, title = "Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P", author = "Gehl, Robert W.", publisher = "The MIT Press", isbn = "9780262038263, 9780262347570", year = "2018", series = "Information Society Series", edition = "", volume = "", url = "", } @book{collier2024, title = "{Tor: From the Dark Web to the Future of Privacy}", author = {Collier, Ben}, year = {2024}, publisher = {The MIT Press}, month = {04}, abstract = "{A biography of Tor -- a cultural and technological history of power, privacy, and global politics at the internet's core.Tor, one of the most important and misunderstood technologies of the digital age, is best known as the infrastructure underpinning the so-called Dark Web. But the real “dark web,” when it comes to Tor, is the hidden history brought to light in this book: where this complex and contested infrastructure came from, why it exists, and how it connects with global power in intricate and intimate ways. In Tor: From the Dark Web to the Future of Privacy,Ben Collier has written, in essence, a biography of Tor -- a cultural and technological history of power, privacy, politics, and empire in the deepest reaches of the internet.The story of Tor begins in the 1990s with its creation by the US Navy's Naval Research Lab, from a convergence of different cultural worlds. Drawing on in-depth interviews with designers, developers, activists, and users, along with twenty years of mailing lists, design documents, reporting, and legal papers, Collier traces Tor's evolution from those early days to its current operation on the frontlines of global digital power -- including the strange collaboration between US military scientists and a group of freewheeling hackers called the Cypherpunks. As Collier charts the rise and fall of three different cultures in Tor's diverse community -- the engineers, the maintainers, and the activists, each with a distinct understanding of and vision for Tor -- he reckons with Tor's complicated, changing relationship with contemporary US empire. Ultimately, the book reveals how different groups of users have repurposed Tor and built new technologies and worlds of their own around it, with profound implications for the future of the Internet.}", isbn = {9780262378925}, doi = {10.7551/mitpress/14907.001.0001}, url = {https://doi.org/10.7551/mitpress/14907.001.0001}, eprint = {https://direct.mit.edu/book-pdf/2362316/book\_9780262378925.pdf}, }