Tor has grown beyond its original purpose as an anonymity tool and has become a widely-used censorship circumvention tool. This is the first study to examine Tor's usability in this role. We evaluate, design, and test the Tor configuration interface by placing users in simulated censorship environments, instructing them to use Tor to circumvent censorship, and measuring their interactions with the interface. A 16-participant qualitative user study identifies common user struggles while circumventing censorship. We use the results as feedback to redesign the configuration interface. A 116-participant quantitative user study tests the impact of our changes. We find that our changes result in a significant reduction in the time spent configuring a connections. We conclude with recommendations for changes to the current interface as well as alternative approaches to bootstrapping a connection to Tor.
Title
Tor's Usability for Censorship Circumvention
Published
2016-05-12
Full Collection Name
Electrical Engineering & Computer Sciences Technical Reports
Other Identifiers
EECS-2016-58
Type
Text
Extent
23 p
Archive
The Engineering Library
Usage Statement
Researchers may make free and open use of the UC Berkeley Library’s digitized public domain materials. However, some materials in our online collections may be protected by U.S. copyright law (Title 17, U.S.C.). Use or reproduction of materials protected by copyright beyond that allowed by fair use (Title 17, U.S.C. § 107) requires permission from the copyright owners. The use or reproduction of some materials may also be restricted by terms of University of California gift or purchase agreements, privacy and publicity rights, or trademark law. Responsibility for determining rights status and permissibility of any use or reproduction rests exclusively with the researcher. To learn more or make inquiries, please see our permissions policies (https://www.lib.berkeley.edu/about/permissions-policies).