![]() Data should be aggregated at its source, includingĬategorizing single events and memorizing category counts only, summing Source aggregation Possibly sensitive data should exist for as short a timeĪs possible. The level of detail of measured data should be as small as possible. Three main guidelines: Data minimalism The first and most important guideline is that only the minimumĪmount of statistical data should be gathered to solve a given problem. Openly by discussion during the proposal process for changes to the Tor source,Īnd/or supported by closer analysis in form of Tor Technicalįor data we collect from the public Tor network, we will always follow Safety and privacy assessment is usually done Privacy concerns regarding data collection by Tor Metrics are guided by the Tor Research Data can be used toĭetect possible censorship events or attacks against the network. Monitoring, understanding, and improving the network. The goals of a privacy and anonymity network like Tor are not easilyĬombined with extensive data gathering, but at the same time data is needed for ![]() Sensitive data, such as unencrypted contents of traffic. We never publish statistics-or aggregate statistics-of Through a rigorous review and discussion process before appearing here. We only use public, non-sensitive data for metrics. Tor Metrics archives historical data about the Tor ecosystem, collectsĭata from the public Tor network and related services, and assists inĭeveloping novel approaches to safe, privacy preserving data
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |