|
Ethical Tor Research Guidelines |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : Draft 1.1 1. Goals of this document. In general, to describe how to conduct responsible research on Tor and similar privacy tools. To develop guidelines for research activity that researchers can use to evaluate their proposed plan. Produce a non-exhaustive list of specific types of unacceptable activity. Develop a due diligence process for research that falls in the scope of potentially dangerous activities. This process can require some notification and feedback from the Tor network or other third parties. 2. General principles Experimentation does not justify endangering people. Just as in medicine, there are experiments in privacy that can only be performed by creating an unacceptable degree of human harm. These experiments are not justified, any more than the gains to human knowledge would justify unethical medical research on human subjects. Research on humans' data is human research. Over the last century, we have made enormous strides in what research we consider ethical to perform on people in other domains. For example, we have generally decided that it's ethically dubious to experiment on human subjects without their informed consent. We should make sure that privacy research is at least as ethical as research in other fields. We should use our domain knowledge concerning privacy when assessing risks. Privacy researchers know that information which other fields consider non-invasive can be used to identify people, and we should take this knowledge into account when designing our research. Finally, users and implementors must remember that should not does not imply can not. Guidelines like these can serve to guide researchers who are genuinely concerned with doing the right thing and behaving ethically they cannot restrain the unscrupulous or unethical. Against invasions like these, other mechanisms like improved privacy software are necessary. 3. Guidelines for research 1. Only collect data that is acceptable to publish. If it would be inappropriate to share it with the world, it is invasive to collect it. In the case of encrypted or secret-shared data, it can be acceptable to assume that the keys or some shares are not published. 2. Only collect as much data as is needed practice data minimization. 1. Whenever possible, use analysis techniques that do not require sensitive data, but which work on anonymized aggregates. 3. Limit the granularity of the data. For example, noise added data inaccuracies should almost certainly be added. This will require a working statistical background, but helps to avoid harm to users. 4. Make an explicit description of benefits and risks, and argue that the benefits outweigh the risks. 1. In order to be sure that risks have been correctly identified, seek external review from domain experts. Frequently there are non-obvious risks. 2. Consider auxiliary data when assessing the risk of your research. Data which is not damaging on its own can become dangerous when other data is also available. For example, data from exit traffic can be combined with entry traffic to deanonymize users. 3. Respect people's own judgments concerning their privacy interests in their own data. 4. It's a warning sign if you can't disclose details of your data collection in advance. If knowing about your study would cause your subjects to object to it, that's a good sign that you're doing something dubious. 5. Use a test network when at all possible. 1. If you can experiment either on a test network without real users, or on a live network, use the test network. 2. If you can experiment either on your own traffic or on the traffic of strangers, use your own traffic. 3. It was easier that way is not justification for using live test network traffic over user traffic. 4. Examples of unacceptable research activity It is not acceptable to run an HSDir, harvest onion addresses, and publish or connect to those onion addresses. Don't set up exit relays to sniff, or tamper with exit traffic. Some broad measurements relative frequency of ports large-grained volume may be acceptable depending on risk benefit tradeoffs fine-grained measures are not. Don't set up relays that are deliberately dysfunctional e.g., terminate connections to specific sites .
Les mots clés de la revue de presse pour cet article : ethical research guidelines Les videos sur SecuObs pour les mots clés : ethical research Les éléments de la revue Twitter pour les mots clé : research
Les derniers articles du site "The Tor Blog blogs" :
- Tor Browser 5.5.5 is released - GetTor New Ways to Download Tor Browser - Tor Messenger 0.1.0b6 is released - Q and A with An East African Human Rights Activist - The Trouble with CloudFlare - Tor 0.2.8.2-alpha is released - OONI Explorer Censorship and other Network Anomalies Around the World - A Statement from The Tor Project on Software Integrity and Apple - Tor Browser 5.5.4 is released - Tor Browser 6.0a4 is released
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|