Validating data in Go

Fingerprinting VPNs with Custom Router Firmware [pdf]

Anomalous keys in Tor relays

Anomalous keys in Tor relays

The Effect of DNS on Tor’s Anonymity