You may choose to investigate one specific class of anonymous technology (e.g., anonymous web browsing, anonymous P2P communication, anonymous emailing service, anonymous content distribution), one specific technique (e.g., onion routing, proxy server, mix network, remailer), or one specific application (e.g., Tor, I2P, Freenet, Mixmaster, Osiris Serveless Portal System).
The essay should contain a maximum of 1100 words – excluded the list of references, and should:
1.Summarise, in no more than 150 words how the chosen class, technique, or application works. Use references to provide deeper explanations and definitions.
2.Discuss how the chosen class, technique, or application has been used by Internet users for legitimate purposes.
3.Discuss how the chosen class, technique, or application has been used by cybercriminals (illegitimate purposes).
4.Discuss and critically evaluate which measures can be adopted against the chosen anonymous technology used by cybercriminals.
5.Critically evaluate and discuss the literature, rather than simply regurgitating what you have read.
6.Contrast and compare the legitimate and illegitimate viewpoints (usages) of the chosen anonymous technology.