Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon

Fassl, Matthias and Ponticello, Alexander and Dabrowski, Adrian and Krombholz, Katharina
(2023) Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon.
Proceedings of the ACM on Human-Computer Interaction, 7 (CSCW2).

[img] Text
Investigating_Security_Folklore__The_Case_Study_of_the_Tor_over_VPN_Phenomenon__CSCW_2023.pdf

Download (1MB)
[img] Archive
Supplemental Material (CSCW 2023).zip

Download (244MB)
Official URL: https://doi.org/10.1145/3610193

Abstract

Users face security folklore in their daily lives in the form of security advice, myths, and word-of-mouth stories. Using a VPN to access the Tor network, i.e., Tor over VPN, is an interesting example of security folklore because of its inconclusive security benefits and its occurrence in pop-culture media. Following the Theory of Reasoned Action, we investigated the phenomenon with three studies: (1) we quantified the behavior on real-world Tor traffic and measured a prevalence of 6.23%; (2) we surveyed users' intentions and beliefs, discovering that they try to protect themselves from the Tor network or increase their general security; and (3) we analyzed online information sources, suggesting that perceived norms and ease-of-use play a significant role while behavioral beliefs about the purpose and effect are less crucial in spreading security folklore. We discuss how to communicate security advice effectively and combat security misinformation and misconceptions.

Actions

Actions (login required)

View Item View Item