https://news.softpedia.com/news/mozilla-firefox-could-soon-get-a-tor-mode-ad... https://www.zdnet.com/article/new-mirai-botnet-lurks-in-the-tor-network-to-s... OSINT Analysis of the TOR Foundation https://arxiv.org/pdf/1803.05201.pdf Tempest: Temporal Dynamics in Anonymity Systems https://arxiv.org/pdf/1801.01932.pdf Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits https://arxiv.org/pdf/1808.09237.pdf DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning https://arxiv.org/pdf/1808.07285.pdf Onions in the Crosshairs: When The Man really is out to get you https://arxiv.org/pdf/1706.10292.pdf Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research https://arxiv.org/pdf/1803.02816.pdf Adaptive Traffic Fingerprinting for Darknet Threat Intelligence https://arxiv.org/pdf/1808.01155.pdf Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks https://arxiv.org/pdf/1704.00843.pdf Peel the onion: Recognition of Android apps behind the Tor Network https://arxiv.org/pdf/1901.04434.pdf Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks https://arxiv.org/pdf/1902.06421.pdf Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces https://arxiv.org/pdf/1902.06626.pdf A Forensic Audit of the Tor Browser Bundle https://arxiv.org/pdf/1907.10279.pdf Anomalous keys in Tor relays https://arxiv.org/pdf/1704.00792.pdf Mitigating Censorship with Multi-Circuit Tor and Linear Network Coding https://arxiv.org/pdf/1907.03473.pdf DNS-Morph: UDP-Based Bootstrapping Protocol For Tor https://arxiv.org/pdf/1904.01240.pdf Towards Predicting Efficient and Anonymous Tor Circuits https://arxiv.org/pdf/1805.01977.pdf TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems https://arxiv.org/pdf/1708.08162.pdf DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback https://arxiv.org/pdf/1705.09460.pdf Deanonymizing Tor hidden service users through Bitcoin transactions analysis https://arxiv.org/pdf/1801.07501.pdf Tor Users Contributing to Wikipedia: Just Like Everybody Else? https://arxiv.org/pdf/1904.04324.pdf Open Dataset of Phishing and Tor Hidden Services Screen-captures https://arxiv.org/pdf/1908.02449.pdf A Broad Evaluation of the Tor English Content Ecosystem https://arxiv.org/pdf/1902.06680.pdf Structure and Content of the Visible Darknet https://arxiv.org/pdf/1811.01348.pdf On the Complexity of Anonymous Communication Through Public Networks https://arxiv.org/pdf/1902.06306.pdf A Survey of Privacy Infrastructures and Their Vulnerabilities https://arxiv.org/pdf/1812.06226.pdf The Effectiveness of Privacy Enhancing Technologies against Fingerprinting https://arxiv.org/pdf/1812.03920.pdf Where The Light Gets In: Analyzing Web Censorship Mechanisms in India https://arxiv.org/pdf/1808.01708.pdf An Extensive Evaluation of the Internet's Open Proxies https://arxiv.org/pdf/1806.10258.pdf Measuring I2P Censorship at a Global Scale https://arxiv.org/pdf/1907.07120.pdf An Empirical Study of the I2P Anonymity Network and its Censorship Resistance https://arxiv.org/pdf/1809.09086.pdf Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains https://arxiv.org/pdf/1906.04953.pdf BlockTag: Design and applications of a tagging system for blockchain analysis https://arxiv.org/pdf/1809.06044.pdf Interesting that many attacks on overlay networks seem to depend on lack of fulltime 100% capacity fill and reclocking, and that no overlay [or underlying physical] networks currently deploy it, nor do many nets of other design seem to make extensive impact upon that class of GPA. Even 14.4-56k rates could could have interesting uses at secure levels.