Facilitating the Adoption of Tor by Focusing on a Promising Target Group

The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has not emerged as of today. One possibility to stimulate adoption is to facilitate it in a specific subnet. The idea is to identify a promising target group which has a substantial benefit from adopting the technology and to facilitate the adoption within that target group. We examine the feasibility of this approach for anonymity services. We identify a potential target group --- consumers of pornographic online material --- and empirically validate their suitability by conducting a traffic analysis. We also discuss several business models for anonymity services. We argue that providers of anonymity services should try to generate revenue from content providers like adult entertainment distributors. The latter could benefit from offering anonymous access to their products by differentiating against competitors or by selling their products at a higher price over the anonymous channel.

[1]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[2]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[3]  Jeremy Clark,et al.  Usability of anonymous web browsing: an examination of Tor interfaces and deployability , 2007, SOUPS '07.

[4]  J. Billy,et al.  Assessment of factors affecting the validity of self-reported health-risk behavior among adolescents: evidence from the scientific literature. , 2003, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[5]  Alessandro Acquisti,et al.  Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.

[6]  Jan Camenisch,et al.  An efficient fair payment system , 1996, CCS '96.

[7]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[8]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[9]  Rainer Böhme,et al.  Pricing strategies in electronic marketplaces with privacy-enhancing technologies , 2007, Wirtsch..

[10]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[11]  Stuart E. Schechter,et al.  Bootstrapping the Adoption of Internet Security Protocols , 2006, WEIS.

[12]  Hannes Federrath Privacy Enhanced Technologies: Methods - Markets - Misuse , 2005, TrustBus.

[13]  Steve G. Sutton Editors comments: Rediscovering our IS roots , 2004, Int. J. Account. Inf. Syst..

[14]  George Danezis,et al.  Mix Cascades vs. Peer-to-Peer: Is One Concept Superior? , 2004 .

[15]  Nick Mathewson,et al.  Anonymity Loves Company: Usability and the Network Effect , 2006, WEIS.

[16]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[17]  Sarah Spiekermann The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services , 2005, Int. J. Technol. Hum. Interact..

[18]  Andreas Pfitzmann,et al.  Networks Without User Observability: Design Options , 1985, EUROCRYPT.

[19]  Birgit Pfitzmann,et al.  ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.

[20]  Hannes Federrath,et al.  Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[21]  Blaise Cronin,et al.  E-Rogenous Zones: Positioning Pornography in the Digital Economy , 2001, Inf. Soc..

[22]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[23]  Cecil Eng Huang Chua,et al.  Why Do People Pay for Information Goods? A Study of the Online Porn Industry , 2006, AMCIS.

[24]  Fabio D’Orlando The Market for Pornography in Italy: Empirical Data and Theoretical Considerations , 2008 .

[25]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[26]  Dennis F. Galletta,et al.  Web Site Delays: How Tolerant are Users? , 2004, J. Assoc. Inf. Syst..

[27]  Hermann Ney,et al.  Discriminative training for object recognition using image patches , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[28]  Alessandro Acquisti,et al.  Privacy and Rationality , 2006 .

[29]  James E. Pitkow,et al.  Summary of WWW characterizations , 1998, World Wide Web.

[30]  Andrew M. Odlyzko,et al.  The Case Against Micropayments , 2003, Financial Cryptography.

[31]  Sarah Spiekermann Die Konsumenten der Anonymität - Wer nutzt Anonymisierungsdienste? , 2003, Datenschutz und Datensicherheit.

[32]  George Danezis,et al.  On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?" , 2004, Privacy Enhancing Technologies.

[33]  Azy Barak,et al.  The Two Faces of the Internet: Introduction to the Special Issue on the Internet and Sexuality , 2000, Cyberpsychology Behav. Soc. Netw..

[34]  Ian O. Angell Ethics and morality: a business opportunity for the amoral? , 2007 .

[35]  P. Chatterjee,et al.  Modeling the Clickstream: Implications for Web-Based Advertising Efforts , 2003 .

[36]  Franz Pichler,et al.  Advances in Cryptology — EUROCRYPT’ 85 , 2000, Lecture Notes in Computer Science.

[37]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[38]  P. Syverson The Paradoxical Value of Privacy , 2003 .

[39]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[40]  Joan Feigenbaum,et al.  Economic Barriers to the Deployment of Existing Privacy Technologies , 2002 .

[41]  Dirk Grunwald,et al.  Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.

[42]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[43]  Otto Spaniol,et al.  Mobilkommunikation ohne Bewegungsprofile , 1996, Informationstechnik Tech. Inform..