Paper Reading Questions

For each paper, you should submit two text files via the Gradescope submission web site, as described below. The submission is due before lecture.

Lecture 21

Why do Kwon et al. argue that website fingerprinting attacks are more realistic in the case of deanonymizing users accessing hidden services, as opposed to deanonymizing users accessing arbitrary websites?