Talk:Tor (network): Difference between revisions
→Goverment Law enforcement mediated Deanonymization: new section |
|||
Line 146: | Line 146: | ||
I added a section related to the past decade of law enforcement agencies using a variety of technologies to deanonymize Tor. Recently 2019 and forward there has been some new form a attack that does not use a NIT, and has some greater than 50% reliablity. The law enforcement agencies only appear to be able to deanonymize a few IP addresses per day, so whatever the method, it's computationally intensive. I digress.....the point is, I added a section, but don't think it's necessarily in the correct place. It could be broken down by year in the '''Reception, impact, and legislation''' section, which doesn't seem to be the right title for the by-year section. We mention a government attack early on in the '''Firefox/Tor browser attack''' section, OR we have an entire section of attacks in '''weaknesses'''. It seems like we have different attacks and vulnerabilities scattered all over the place. Is this best? I'm opening the floor for a lengthy debate, since the organization seems a tad haphazard if the goal was to read the article and understand the history of vulnerabilities and attacks etc. [[User:PaladinOfDaedalus|eximo]] ([[User talk:PaladinOfDaedalus|talk]]) 00:32, 2 March 2024 (UTC) |
I added a section related to the past decade of law enforcement agencies using a variety of technologies to deanonymize Tor. Recently 2019 and forward there has been some new form a attack that does not use a NIT, and has some greater than 50% reliablity. The law enforcement agencies only appear to be able to deanonymize a few IP addresses per day, so whatever the method, it's computationally intensive. I digress.....the point is, I added a section, but don't think it's necessarily in the correct place. It could be broken down by year in the '''Reception, impact, and legislation''' section, which doesn't seem to be the right title for the by-year section. We mention a government attack early on in the '''Firefox/Tor browser attack''' section, OR we have an entire section of attacks in '''weaknesses'''. It seems like we have different attacks and vulnerabilities scattered all over the place. Is this best? I'm opening the floor for a lengthy debate, since the organization seems a tad haphazard if the goal was to read the article and understand the history of vulnerabilities and attacks etc. [[User:PaladinOfDaedalus|eximo]] ([[User talk:PaladinOfDaedalus|talk]]) 00:32, 2 March 2024 (UTC) |
||
:I deleted this section for now, for [[WP:OR]] and [[WP:PRIMARY]]. These attacks should likely be discussed where we have reliable information on them, but we can't rely on primary evidence like court documents, and we definitely can't conjecture on the nature of them using research papers. Speaking as a domain expert, I doubt that any of these attacks performed by law enforcement are related to that particular research. Website fingerprinting does not directly allow for IP deanonymization, it merely allows identifying the nature (or really, class in a classifier) of particular traffic; i.e., it would at best allow the attacker to know when and which site was being accessed, but when executed on a middle relay, it would not leak who was accessing it or where the site is hosted. There's a much larger body of research on doing these attacks from one of ends of the circuit (e.g., a guard relay or client ISP), but I've never heard of law enforcement using them (for many reasons too off topic to go into here). |
|||
:As to the more general discussion, the rule of thumb I think this page should use is:''' Do we have a reliable, non-primary source that the attack was performed on real, non-consenting Tor users, or did the attack affect the design or implementation of Tor in some way that affects how Tor itself is described in the rest of the article?''' If the answer to both of those questions is no, it's either not reliable or not notable enough to warrant discussion on the main Tor article. |
|||
:There are some changes I'd like to see made related to this, like moving "weaknesses" into the "operation" section and pared down to just the things that impact Tor's design, and restructuring the "Reception, impact, and legislation" section from a timeline into cleaner subsections on "attacks", "censorship", "awards", etc.. The article as a whole currently feels like a kludge of random facts (or "facts") that felt relevant when they were written, but haven't aged well. Ideally, the article should be something that someone can read though the article and come away understanding what Tor is, who uses it, why, and what its limitations are. [[User:Tga.D|Tga]] ([[User talk:Tga.D|talk]]) 05:34, 2 March 2024 (UTC) |
Revision as of 05:34, 2 March 2024
The contents of the TorSearch page were merged into Tor (network) on 8 February 2023. For the contribution history and old versions of the redirected page, please see its history; for the discussion at that location, see its talk page. |
TorSearch was nominated for deletion. The discussion was closed on 19 October 2022 with a consensus to merge. Its contents were merged into Tor (network). The original page is now a redirect to this page. For the contribution history and old versions of the redirected article, please see its history; for its talk page, see here. |
This is the talk page for discussing improvements to the Tor (network) article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1, 2, 3Auto-archiving period: 60 days |
This level-5 vital article is rated B-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
The subject of this article is controversial and content may be in dispute. When updating the article, be bold, but not reckless. Feel free to try to improve the article, but don't take it personally if your changes are reversed; instead, come here to the talk page to discuss them. Content must be written from a neutral point of view. Include citations when adding content and consider tagging or removing unsourced information. |
The contents of the Portable Tor page were merged into Tor (network) on 9 November 2013. For the contribution history and old versions of the redirected page, please see its history; for the discussion at that location, see its talk page. |
Wiki Education Foundation-supported course assignment
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s): Atticusbixby.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 11:31, 17 January 2022 (UTC)
Partial impartiality
"An extract of a Top Secret appraisal by the National Security Agency (NSA) characterized Tor as "the King of high secure, low latency Internet anonymity" with "no contenders for the throne in waiting"."
"As of 2012, 80% of The Tor Project's $2M annual budget came from the United States government,"
hahaha. oh dear. — Preceding unsigned comment added by 220.233.16.6 (talk) 08:12, 7 October 2014
Hello,
I'm definitely late with my response, but I'm adding this comment for posterity, as this isn't the first time I've read something like this.
Sponsors are publicly listed: https://www.torproject.org/about/sponsors/
Here is an excerpt from the text of this page:
The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.
If you develop something especially for "covert" operations, it will be quickly fingerprinted and attributed to that group. What they need is repudiation, so it makes sense that the more users have access to that tool, the easier it is to blend in. The same argument can be made for Ghidra (originally developed by the NSA) or even SELinux. I do remember reading about this somewhere, but can't figure out where at the moment.
Anything can devolve into conspiracy territory, but at some point in the (digital) world someone has to be trusted, there is no other way around it. Personally, while nothing is perfect, I trust the Tor Project and what they are doing.
Kind regards,
IrrationalBeing (talk) 20:03, 20 April 2022 (UTC)
Requested move 26 May 2021
- The following is a closed discussion of a requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a move review after discussing it on the closer's talk page. No further edits should be made to this discussion.
The result of the move request was: Moved (non-admin closure) (t · c) buidhe 15:50, 2 June 2021 (UTC)
Tor (anonymity network) → Tor (network) – simpler disambiguation term Deku-shrub (talk) 22:01, 25 May 2021 (UTC)
- This is a contested technical request (permalink). Anthony Appleyard (talk) 14:47, 26 May 2021 (UTC)
- @Deku-shrub and Amakuru: queried move request Anthony Appleyard (talk) 14:47, 26 May 2021 (UTC)
- Oppose. It isn't just a "network", it's also a software that you can download. I don't think the proposed name adequately explains to a user what the subject is, and the present title is better per WP:RECOGNIZE. — Amakuru (talk) 13:30, 26 May 2021 (UTC)
- By that argument, Tor (anonymity network) doesn't work either. --Ahecht (TALK
PAGE) 14:54, 26 May 2021 (UTC)- Well we could just go with "Tor (software)", which covers everything. I wouldn't mind that. As I pointed out though, "Anonymity network" has the advantage that someone familiar with the subject will be able to recognise it, whereas with just "network" I suspect they wouldn't. — Amakuru (talk) 15:29, 26 May 2021 (UTC)
- Tor is not software. There is an implementation of Tor confusingly called tor (also known as little-t-tor) that is the flagship implementation of Tor's protocols, but the network is a different element of the ontology. E.g., little-t-tor cannot reach consensus, only the network as a whole can do that. There are also other implementations aside from little-t-tor that are part of the network, and some elements (e.g., snowflakes) that don't speak the same protocol at all. --Tga (talk) 15:46, 26 May 2021 (UTC)
- Well we could just go with "Tor (software)", which covers everything. I wouldn't mind that. As I pointed out though, "Anonymity network" has the advantage that someone familiar with the subject will be able to recognise it, whereas with just "network" I suspect they wouldn't. — Amakuru (talk) 15:29, 26 May 2021 (UTC)
- By that argument, Tor (anonymity network) doesn't work either. --Ahecht (TALK
- Support this, but prefer "Tor (anonymity network)" → "Tor" This proposal makes the title simpler with no loss of clarity. Instead of this proposal, I prefer moving to "Tor" without disambiguation. According to the pageview report for "Tor" the Tor network gets much more traffic than any other use of the term, making it the WP:PRIMARYTOPIC. I advocated for moving this article to "Tor" in previous move discussions in this talk archive. The primary opposition in the past was that the geological term "tor" occupied the name "tor", but now someone has moved it to Tor (rock formation) leaving no competing primary topic. Since the space is open, I prefer this article to be at "Tor". Blue Rasberry (talk) 15:03, 26 May 2021 (UTC)
- I would appose that. Tor (rock formation) is a much more prominent topic when considering long-term significance. — Amakuru (talk) 15:29, 26 May 2021 (UTC)
- I took another look and I am not even sure that "tor" article passes WP:GNG to be a stand alone article. I started a merge discussion at Talk:Tor_(rock_formation)#Requested_move_31_May_2021. Blue Rasberry (talk) 13:45, 31 May 2021 (UTC)
- I too would oppose that on the same grounds as Amakuru, and it would require a new move discussion that actually shewed up at Tor. Sneaky to try to do it by the back-door. DuncanHill (talk) 14:13, 31 May 2021 (UTC)
- Support. Tor is used for purposes other than anonymity these days. Its NAT punching is used by OnionShare to simplify direct file transfers, the anti-censorship mechanisms are in some respects orthogonal to the anonymity guarantees, Onion Services are frequently used in places where DNS or static IP addresses aren't available, etc.. Hadn't occurred to me before, but this change makes a lot of sense. --Tga (talk) 16:02, 26 May 2021 (UTC)
- Support per WP:CONCISE. Rublov (talk) 19:50, 26 May 2021 (UTC)
- Support if more words were not needed to disambiguate we would just call this subject "Tor", so the argument that more is needed per WP:RECOGNIZE doesn't hold up. VQuakr (talk) 20:33, 26 May 2021 (UTC)
- Support per nom. LSGH (talk) (contributions) 10:53, 29 May 2021 (UTC)
- Support per WP:CONCISE and the fact that we don't have other articles for networks called "Tor". – Finnusertop (talk ⋅ contribs) 12:48, 31 May 2021 (UTC)
- Support as an improvement per WP:CONCISE. — Rhododendrites talk \\ 14:05, 31 May 2021 (UTC)
Some reorg work and a broken link
First the trivial: As of this day, link [41] (Cox, Joseph (1 February 2016). "Study Claims Dark Web Sites Are Most Commonly Used for Crimes". Retrieved 20 March 2016.) referring to the graph to Tor usage is broken, and thus the traffic statistics presented are called into question.
So far as I can tell, there are now numerous claims being made about the utility and cost of ToR. One of the best papers I've seen that isn't cited yet is a 2020 work by Jardine et al: The potential harms of the Tor anonymity network cluster disproportionately in free countries; Eric Jardine, Andrew M. Lindner, Gareth Owenson; Proceedings of the National Academy of Sciences Dec 2020, 117 (50) 31716-31721; DOI: 10.1073/pnas.2011893117
On the other hand, there is a well known quote from a blog from the CEO of Cloudflare indicating that some 94% of requests they were seeing in 2016 was malware. See https://blog.cloudflare.com/the-trouble-with-tor/. That quote is a bit long in the tooth as well.
These claims are not completely out of alignment with one another, because of the methodologies used. The Jardine work in particular compares in network versus out of network access, while of course Cloudflare is looking only at its clear site access.
My suggestion is that the controversy over benefits versus drawbacks be called out in a bit more articulate fashion, a'la "here are purported benefits... here are purported risks..." That would also more clearly demonstrate balance to the reader. Pigdog234 (talk) 09:54, 31 May 2021 (UTC)
Why there was no info of Onionoo API in the article!?
This needs to be investigated. Wikipedia is seriously abusing this API, and I suppose even logs ips, considering somehow only less protected ips are blocked by real people, and others are just blocked by Tor Block extension of wikimedia engine on github. I will propose to stop Onionoo to Tor Project. Valery Zapolodov (talk) 18:05, 6 June 2021 (UTC)
- Tor Project doesn't make a habit of reading the Tor Wikipedia page, much less the talk, and this isn't the place to discuss it. Opinions on policy decisions, unless part of a public debate between notable parties with verifiable secondary sources, doesn't have any place in a Wikipedia article, nor in the talk page. As for mentioning the existence of the API in the article, I suppose there's no real reason not to, but there also hasn't been a compelling reason for it, since it's just an API for information that can mostly be gotten elsewhere―most notably, the public consensus files (Tor clients wouldn't be able to choose their circuits if there wasn't a publicly available consensus; there's research into reducing the fraction of the network that an individual client must know, for performance reasons, but there's no way to prevent enumeration―particularly when there's only a thousand or so exit relays at any given time anyway, which is what sites like Wikipedia care about for blocking). --Tga (talk) 19:26, 6 June 2021 (UTC)
- You did not age well, we now have Snowflake, so anyone will be able to be an exit node, even mobile, and consensus is now more vague, P2P style. The fact that Onionoo can see both relays and exit nodes and reading phabricator of wikipedia https://phabricator.wikimedia.org/T49626 you can turn off relays (which you did), since those are not what your AS sees when one accesses Wikipedia. This is disgusting behavioir from Wikimedia foundation and we all certainly will do anything so that even humans will not be able to enumerate Tor. Now that we see Cloudflare and even Google search abusing it, we finally can vote to turn that thing off. Valery Zapolodov (talk) 05:28, 18 September 2022 (UTC)
- Snowflakes aren't exits, they're actually not even relays (they're proxies to a couple designated bridges, so someone connecting to a website via the Snowflake PT connects to their ISP->snowflake proxy->snowflake Tor bridge->middle Tor relay->exit Tor relay). The same amount of information is available as has always been, there's just now a larger pool of bridge IPs from Snowflake proxy volunteers. Bridge IPs, so the IP addresses of the first hop used for censorship circumvention, have always been secret, other than the default bridges that ship with Tor Browser.
- Again, if you have problems with how some organizations operate, a Wikipedia article talk page is not the place to discuss those issues, though before discussing such issues in more appropriate forums, it might be worthwhile spending some time reading the documentation to understand the underlying technology first (you can read more at the snowflake docs, the Tor manual, and the tor spec). -- Tga (talk) 04:04, 19 September 2022 (UTC)
- You did not age well, we now have Snowflake, so anyone will be able to be an exit node, even mobile, and consensus is now more vague, P2P style. The fact that Onionoo can see both relays and exit nodes and reading phabricator of wikipedia https://phabricator.wikimedia.org/T49626 you can turn off relays (which you did), since those are not what your AS sees when one accesses Wikipedia. This is disgusting behavioir from Wikimedia foundation and we all certainly will do anything so that even humans will not be able to enumerate Tor. Now that we see Cloudflare and even Google search abusing it, we finally can vote to turn that thing off. Valery Zapolodov (talk) 05:28, 18 September 2022 (UTC)
Merger proposal
- The following discussion is closed. Please do not modify it. Subsequent comments should be made in a new section. A summary of the conclusions reached follows.
- Not merged. czar 02:41, 10 September 2021 (UTC)
- I oppose combining the articles. If anything, a new Tor Browser article should be spun off from Tor_(network)#Implementations. Tor Phone should be added to the list of tools at The_Tor_Project#Tools; note Orbot there also has its own article, which needs improvement. Spending some time on those would be more useful. -- ~~~~ Yae4 (talk) 11:56, 19 August 2021 (UTC)
- I have added all the important text of Tor Phone in Tor_project#tools. I didn't the related projects, what libraries it uses, or any guide on what people can use other than this. --Greatder (talk) 05:30, 20 August 2021 (UTC)
- Noting your link called "Tor_project#tools" is actually a redirect to this page, Tor (network). That is confusing at best, or misleading at worst. -- Yae4 (talk) 13:24, 20 August 2021 (UTC)
- I have added all the important text of Tor Phone in Tor_project#tools. I didn't the related projects, what libraries it uses, or any guide on what people can use other than this. --Greatder (talk) 05:30, 20 August 2021 (UTC)
- Oppose Information about the Tor phone is outdated by about 5 years and would not improve the main Tor article. There is too much information there so merging would be WP:UNDUE. The Tor phone meets notability on its own. Blue Rasberry (talk) 15:08, 19 August 2021 (UTC)
- @Bluerasberry: What does age of the information have to do with article improvement? This isn't wikinews. --Greatder (talk) 07:11, 21 August 2021 (UTC)
- @Greatder: It is relevant because large organizations with long histories and which go through huge sums of money have many dead projects, and adding lots of text about them to the main organization page does not help anyone understand the organization today. Blue Rasberry (talk) 13:51, 21 August 2021 (UTC)
- Oppose - Per Blue Rasberry. Nom's rationale in unconvincing. - Aoidh (talk) 13:15, 20 August 2021 (UTC)
- Comment:: First of all shouldn't this merge request be closed by now? Second, even adding a line referencing the project isn't allowed anymore? [1] --Greatder (talk) 10:21, 26 August 2021 (UTC)
- Objections to the sentence, and where placed: Tor Phone is not "a tor focused" mobile ROM or operating system, so the sentence was mis-placed, and is basically nonsense. Also, what source describes the Tor Phone project as "attempted" or "abandoned"? So the language is biased. -- Yae4 (talk) 19:25, 26 August 2021 (UTC)
About Tor's acronym
Saw this reverted edit: https://en.wikipedia.org/w/index.php?title=Tor_(network)&diff=1092140671&oldid=1092139313
About this--back in the day, pre-2015 I believe, Tor was written as TOR and did stand for "The Onion Router". Today, it is spelled "Tor", but the acronym is still valid. M4sugared (talk) 22:30, 10 June 2022 (UTC)
- Tor was never written as TOR, even though it did come from "the onion router". You can see a greatly abridged version on the Tor FAQ, and can check the original paper to confirm the capitalization has always been that way. My interpretation, even though it slightly differs from the wording in the FAQ, is that Tor is and always has been a name, not an acronym, and that "the onion router" is just the etymology of that name, not what Tor stands for. E.g., if you were at an academic conference today, and you said "the onion router", people would probably have the same reaction as mentioned in the FAQ (which onion router?), but would understand Tor as a proper noun perfectly fine. Tga (talk) 23:35, 10 June 2022 (UTC)
- Regardless of how the Tor team officially spelled it, it was called TOR at some point in time by some people as the Tor Project posted a notice suggesting that users say "Tor" versus TOR.
- https://www.facebook.com/TorProject/posts/10160801361629951
- Either way, I'll look into how valid Tor standing for The Onion Router is, but based on some reading and what you noted, it seems the acronym has failed out of use. Perhaps it should be removed from the introduction of the article and moved to the history section. M4sugared (talk) 00:34, 11 June 2022 (UTC)
- @M4sugared: In this paper by Paul Syverson (page 7 on the PDF, page 129 on the paper) there's an entire section describing how the word "Tor" came about; emphasizing that it's neither an acronym nor is it ever spelled "TOR". It's worth noting that Syverson is a primary source as he invented onion routing. Flycatchr 10:33, 11 June 2022 (UTC)
- To provide a bit of additional context to the cited Facebook post: The FAQ entry I linked has included "In fact, we can usually spot people who haven't read any of our website (and have instead learned everything they know about Tor from news articles) by the fact that they spell it wrong" since at least 2011. Nothing fell out of use, there's just been a common mistake over the years, one that the Tor Project has consistently tried to correct. Tga (talk) 16:46, 11 June 2022 (UTC)
- IMO The article should explain the naming history some more, based on what "reliable" sources can be found. The lead should give one or two more "popular" uses of "Tor" (also known as). Tor is sometimes known as The Onion Router, sometimes The Onion Routing network, or apparently not as popular: Tor's onion routing. I don't think there is a one and only "correct" definition, so what "reliable" sources can be found should be followed (for wikipedia), and statements attributed to the authors.
- "Reliable" sources (i.e. popular usage) wins at wikipedia, IIUC.
- Facebook is an unreliable source WP:RSPFACEBOOK.
- Current usage of the terms is inconsistent by arguably reliable, independent sources,[2] and at places that should know better.[3]
- We will find numerous "reliable", or at least independent, sources saying Tor is, or was originally, called "The Onion Router" and other things.
- Syverson's 2011 explanation may be correct, or could be wishful thinking and faulty memory. See inconsistent terminology used early at onion-router dot net in archive: "Onion Routing Network" and "The Onion Router Prototype Network".[4]
- That said, I do enjoy "a recursive acronym, ‘Tor’s onion routing’" as much as anyone. -- Yae4 (talk) 01:01, 15 June 2022 (UTC)
- IMO The article should explain the naming history some more, based on what "reliable" sources can be found. The lead should give one or two more "popular" uses of "Tor" (also known as). Tor is sometimes known as The Onion Router, sometimes The Onion Routing network, or apparently not as popular: Tor's onion routing. I don't think there is a one and only "correct" definition, so what "reliable" sources can be found should be followed (for wikipedia), and statements attributed to the authors.
Goverment Law enforcement mediated Deanonymization
I added a section related to the past decade of law enforcement agencies using a variety of technologies to deanonymize Tor. Recently 2019 and forward there has been some new form a attack that does not use a NIT, and has some greater than 50% reliablity. The law enforcement agencies only appear to be able to deanonymize a few IP addresses per day, so whatever the method, it's computationally intensive. I digress.....the point is, I added a section, but don't think it's necessarily in the correct place. It could be broken down by year in the Reception, impact, and legislation section, which doesn't seem to be the right title for the by-year section. We mention a government attack early on in the Firefox/Tor browser attack section, OR we have an entire section of attacks in weaknesses. It seems like we have different attacks and vulnerabilities scattered all over the place. Is this best? I'm opening the floor for a lengthy debate, since the organization seems a tad haphazard if the goal was to read the article and understand the history of vulnerabilities and attacks etc. eximo (talk) 00:32, 2 March 2024 (UTC)
- I deleted this section for now, for WP:OR and WP:PRIMARY. These attacks should likely be discussed where we have reliable information on them, but we can't rely on primary evidence like court documents, and we definitely can't conjecture on the nature of them using research papers. Speaking as a domain expert, I doubt that any of these attacks performed by law enforcement are related to that particular research. Website fingerprinting does not directly allow for IP deanonymization, it merely allows identifying the nature (or really, class in a classifier) of particular traffic; i.e., it would at best allow the attacker to know when and which site was being accessed, but when executed on a middle relay, it would not leak who was accessing it or where the site is hosted. There's a much larger body of research on doing these attacks from one of ends of the circuit (e.g., a guard relay or client ISP), but I've never heard of law enforcement using them (for many reasons too off topic to go into here).
- As to the more general discussion, the rule of thumb I think this page should use is: Do we have a reliable, non-primary source that the attack was performed on real, non-consenting Tor users, or did the attack affect the design or implementation of Tor in some way that affects how Tor itself is described in the rest of the article? If the answer to both of those questions is no, it's either not reliable or not notable enough to warrant discussion on the main Tor article.
- There are some changes I'd like to see made related to this, like moving "weaknesses" into the "operation" section and pared down to just the things that impact Tor's design, and restructuring the "Reception, impact, and legislation" section from a timeline into cleaner subsections on "attacks", "censorship", "awards", etc.. The article as a whole currently feels like a kludge of random facts (or "facts") that felt relevant when they were written, but haven't aged well. Ideally, the article should be something that someone can read though the article and come away understanding what Tor is, who uses it, why, and what its limitations are. Tga (talk) 05:34, 2 March 2024 (UTC)
- B-Class level-5 vital articles
- Wikipedia level-5 vital articles in Technology
- B-Class vital articles in Technology
- B-Class Computing articles
- Mid-importance Computing articles
- B-Class Computer networking articles
- High-importance Computer networking articles
- B-Class Computer networking articles of High-importance
- All Computer networking articles
- B-Class software articles
- Mid-importance software articles
- B-Class software articles of Mid-importance
- All Software articles
- B-Class Computer Security articles
- High-importance Computer Security articles
- B-Class Computer Security articles of High-importance
- All Computer Security articles
- B-Class Free and open-source software articles
- High-importance Free and open-source software articles
- B-Class Free and open-source software articles of High-importance
- All Free and open-source software articles
- All Computing articles
- B-Class Cryptography articles
- Mid-importance Cryptography articles
- B-Class Computer science articles
- Mid-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- B-Class Internet articles
- Mid-importance Internet articles
- WikiProject Internet articles
- B-Class Mass surveillance articles
- Mid-importance Mass surveillance articles
- B-Class law articles
- Low-importance law articles
- WikiProject Law articles
- Wikipedia controversial topics