How Do Tor Users Interact With Onion Services?

Onion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names that are long and difficult for humans to read. In this paper, we study how people perceive, understand, and use onion services based on data from 17 semi-structured interviews and an online survey of 517 users. We find that users have an incomplete mental model of onion services, use these services for anonymity and have varying trust in onion services in general. Users also have difficulty discovering and tracking onion sites and authenticating them. Finally, users want technical improvements to onion services and better information on how to use them. Our findings suggest various improvements for the security and usability of Tor onion services, including ways to automatically detect phishing of onion services, more clear security indicators, and ways to manage onion domain names that are difficult to remember.

[1]  I. Seidman Interviewing as qualitative research : a guide for researchersin education and the social sciences , 1991 .

[2]  Aziz Mohaisen,et al.  Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system , 2014, WPES.

[3]  Adam J. Berinsky,et al.  Separating the Shirkers from the Workers? Making Sure Respondents Pay Attention on Self‐Administered Surveys , 2014 .

[4]  Rachel Greenstadt,et al.  Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians , 2017, CSCW.

[5]  Christian Grothoff,et al.  The GNU Name System , 2020 .

[6]  L. Jean Camp,et al.  Why Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems , 2014 .

[7]  W. Keith Edwards,et al.  More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.

[8]  Juan Caballero,et al.  CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services , 2015, CCS.

[9]  Nasir D. Memon,et al.  New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network , 2017, SOUPS.

[10]  Akira Yamada,et al.  Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior , 2017, CHI.

[11]  Ganesh Iyer,et al.  A Usability Evaluation of Tor Launcher , 2017, Proc. Priv. Enhancing Technol..

[12]  Sunny Consolvo,et al.  Rethinking Connection Security Indicators , 2016, SOUPS.

[13]  Jeremy Clark,et al.  Usability of anonymous web browsing: an examination of Tor interfaces and deployability , 2007, SOUPS '07.

[14]  D. Collins Pretesting survey instruments: An overview of cognitive methods , 2003, Quality of Life Research.

[15]  Aziz Mohaisen,et al.  Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures , 2017, IEEE/ACM Transactions on Networking.

[16]  Nick Feamster,et al.  Identifying and Characterizing Sybils in the Tor Network , 2016, USENIX Security Symposium.

[17]  Ming Li,et al.  The Onion Name System , 2017, Proc. Priv. Enhancing Technol..

[18]  Paul F. Syverson,et al.  Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication , 2015, ArXiv.