{"id":8382,"date":"2012-09-05T11:49:39","date_gmt":"2012-09-05T18:49:39","guid":{"rendered":"http:\/\/betaknowledge.tumblr.com\/post\/30943551533"},"modified":"2017-08-18T17:57:54","modified_gmt":"2017-08-18T17:57:54","slug":"from-a-paper-being-presented-at-the-securecomm-conference-in","status":"publish","type":"post","link":"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/","title":{"rendered":"From a paper being presented at the SecureComm conference in\u2026"},"content":{"rendered":"

From a paper being presented at the SecureComm conference in Italy by Tom Chothia and colleagues at the University of Birmingham, which investigate how users who participate in BitTorrent swarms for popular files are likely to have their IP addresses logged by monitoring companies within three hours.<\/p>

\n<\/img><\/a> <\/img><\/a> <\/img><\/a>\n<\/div>","protected":false},"excerpt":{"rendered":"

From a paper being presented at the SecureComm conference in Italy by Tom Chothia and colleagues at the University of Birmingham, which investigate how users who participate in BitTorrent swarms for popular files are likely to have their IP addresses l…<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[169,194],"tags":[],"yoast_head":"\nFrom a paper being presented at the SecureComm conference in\u2026 - Near Future Laboratory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From a paper being presented at the SecureComm conference in\u2026 - Near Future Laboratory\" \/>\n<meta property=\"og:description\" content=\"From a paper being presented at the SecureComm conference in Italy by Tom Chothia and colleagues at the University of Birmingham, which investigate how users who participate in BitTorrent swarms for popular files are likely to have their IP addresses l...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/\" \/>\n<meta property=\"og:site_name\" content=\"Near Future Laboratory\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-05T18:49:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-18T17:57:54+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/25.media.tumblr.com\/tumblr_m9w4ar85Jt1qgczcwo1_500.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nearfuturelab\" \/>\n<meta name=\"twitter:site\" content=\"@nearfuturelab\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#organization\",\"name\":\"Near Future Laboratory\",\"url\":\"https:\/\/blog.nearfuturelaboratory.com\/\",\"sameAs\":[\"https:\/\/www.instagram.com\/nearfuturelaboratory\/\",\"https:\/\/www.linkedin.com\/company\/near-future-laboratory\/\",\"https:\/\/twitter.com\/nearfuturelab\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.nearfuturelaboratory.com\/wp-content\/uploads\/2019\/10\/NearFutureLaboratoryLogo-CS4.jpg\",\"width\":1049,\"height\":206,\"caption\":\"Near Future Laboratory\"},\"image\":{\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#website\",\"url\":\"https:\/\/blog.nearfuturelaboratory.com\/\",\"name\":\"Near Future Laboratory\",\"description\":\"Clarify Today, Design Tomorrow\",\"publisher\":{\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/blog.nearfuturelaboratory.com\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"http:\/\/25.media.tumblr.com\/tumblr_m9w4ar85Jt1qgczcwo1_500.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/#webpage\",\"url\":\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/\",\"name\":\"From a paper being presented at the SecureComm conference in\\u2026 - Near Future Laboratory\",\"isPartOf\":{\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/#primaryimage\"},\"datePublished\":\"2012-09-05T18:49:39+00:00\",\"dateModified\":\"2017-08-18T17:57:54+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/\"]}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/#webpage\"},\"author\":{\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#\/schema\/person\/622e0f254273ccb1703eee1a6234e569\"},\"headline\":\"From a paper being presented at the SecureComm conference in\\u2026\",\"datePublished\":\"2012-09-05T18:49:39+00:00\",\"dateModified\":\"2017-08-18T17:57:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/#webpage\"},\"publisher\":{\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/2012\/09\/05\/from-a-paper-being-presented-at-the-securecomm-conference-in\/#primaryimage\"},\"articleSection\":\"Syndicated,viz\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#\/schema\/person\/622e0f254273ccb1703eee1a6234e569\",\"name\":\"Nicolas\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.nearfuturelaboratory.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/9956c05ab6379a72f27082e5c5e8dbdd?s=96&d=mm&r=g\",\"caption\":\"Nicolas\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/posts\/8382"}],"collection":[{"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/comments?post=8382"}],"version-history":[{"count":1,"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/posts\/8382\/revisions"}],"predecessor-version":[{"id":10045,"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/posts\/8382\/revisions\/10045"}],"wp:attachment":[{"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/media?parent=8382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/categories?post=8382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.nearfuturelaboratory.com\/wp-json\/wp\/v2\/tags?post=8382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}