{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:RLSJA6IWGZMBRMGM5BQUBE2PKR","short_pith_number":"pith:RLSJA6IW","canonical_record":{"source":{"id":"1708.08162","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-08-28T01:45:14Z","cross_cats_sorted":[],"title_canon_sha256":"4483e51df7019792f11e1203845e29f4e9fd04c53e56396ff7a77693de42fb40","abstract_canon_sha256":"a948a40a8c8f37fef26bf19f43b32c2443f31cd628d1727e070134c1eabd2e54"},"schema_version":"1.0"},"canonical_sha256":"8ae4907916365818b0cce86140934f546af790eb0b49c436d7e01e8692acab2d","source":{"kind":"arxiv","id":"1708.08162","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1708.08162","created_at":"2026-05-18T00:27:52Z"},{"alias_kind":"arxiv_version","alias_value":"1708.08162v3","created_at":"2026-05-18T00:27:52Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1708.08162","created_at":"2026-05-18T00:27:52Z"},{"alias_kind":"pith_short_12","alias_value":"RLSJA6IWGZMB","created_at":"2026-05-18T12:31:39Z"},{"alias_kind":"pith_short_16","alias_value":"RLSJA6IWGZMBRMGM","created_at":"2026-05-18T12:31:39Z"},{"alias_kind":"pith_short_8","alias_value":"RLSJA6IW","created_at":"2026-05-18T12:31:39Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:RLSJA6IWGZMBRMGM5BQUBE2PKR","target":"record","payload":{"canonical_record":{"source":{"id":"1708.08162","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-08-28T01:45:14Z","cross_cats_sorted":[],"title_canon_sha256":"4483e51df7019792f11e1203845e29f4e9fd04c53e56396ff7a77693de42fb40","abstract_canon_sha256":"a948a40a8c8f37fef26bf19f43b32c2443f31cd628d1727e070134c1eabd2e54"},"schema_version":"1.0"},"canonical_sha256":"8ae4907916365818b0cce86140934f546af790eb0b49c436d7e01e8692acab2d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:27:52.290998Z","signature_b64":"TAP3xJDkkcwsgs7X3EESEkq8GfFQkmURgoRi2GrRoqIUUj2dm+/tI53L+iocA7xUzQD83Xc4I3JbeHsFHs+oBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8ae4907916365818b0cce86140934f546af790eb0b49c436d7e01e8692acab2d","last_reissued_at":"2026-05-18T00:27:52.290501Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:27:52.290501Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1708.08162","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:27:52Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Q6lrLnwDwBFPLpzkPjkMZx7xgwhPjI+Gq5+s6+z5VKdhOXHA3TWcjh6F1V6fLEmG2Vm/bxlBvAZzu/AkEB/tAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:31:48.106573Z"},"content_sha256":"d3514d6aae12b66d66fe35d1c3943b29210612a306398e65bc0c0ce3763ee01e","schema_version":"1.0","event_id":"sha256:d3514d6aae12b66d66fe35d1c3943b29210612a306398e65bc0c0ce3763ee01e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:RLSJA6IWGZMBRMGM5BQUBE2PKR","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Philipp Winter, Prateek Mittal, Yih-Chun Hu, Yushan Liu, Zhuotao Liu","submitted_at":"2017-08-28T01:45:14Z","abstract_excerpt":"Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables ab"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1708.08162","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:27:52Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"av/BDcF9uiTG1mKr5qOwBkGFrdRnXqTFH/ihCW5JCq7riImxcIH7hEj26jwwaVJkyFa0lRPNeZrnn1TNAiruCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:31:48.106954Z"},"content_sha256":"bf746e4deb33f70022872bf634555647ca4d3008cd318c046447320ea04afe48","schema_version":"1.0","event_id":"sha256:bf746e4deb33f70022872bf634555647ca4d3008cd318c046447320ea04afe48"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/RLSJA6IWGZMBRMGM5BQUBE2PKR/bundle.json","state_url":"https://pith.science/pith/RLSJA6IWGZMBRMGM5BQUBE2PKR/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/RLSJA6IWGZMBRMGM5BQUBE2PKR/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T22:31:48Z","links":{"resolver":"https://pith.science/pith/RLSJA6IWGZMBRMGM5BQUBE2PKR","bundle":"https://pith.science/pith/RLSJA6IWGZMBRMGM5BQUBE2PKR/bundle.json","state":"https://pith.science/pith/RLSJA6IWGZMBRMGM5BQUBE2PKR/state.json","well_known_bundle":"https://pith.science/.well-known/pith/RLSJA6IWGZMBRMGM5BQUBE2PKR/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:RLSJA6IWGZMBRMGM5BQUBE2PKR","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"a948a40a8c8f37fef26bf19f43b32c2443f31cd628d1727e070134c1eabd2e54","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-08-28T01:45:14Z","title_canon_sha256":"4483e51df7019792f11e1203845e29f4e9fd04c53e56396ff7a77693de42fb40"},"schema_version":"1.0","source":{"id":"1708.08162","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1708.08162","created_at":"2026-05-18T00:27:52Z"},{"alias_kind":"arxiv_version","alias_value":"1708.08162v3","created_at":"2026-05-18T00:27:52Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1708.08162","created_at":"2026-05-18T00:27:52Z"},{"alias_kind":"pith_short_12","alias_value":"RLSJA6IWGZMB","created_at":"2026-05-18T12:31:39Z"},{"alias_kind":"pith_short_16","alias_value":"RLSJA6IWGZMBRMGM","created_at":"2026-05-18T12:31:39Z"},{"alias_kind":"pith_short_8","alias_value":"RLSJA6IW","created_at":"2026-05-18T12:31:39Z"}],"graph_snapshots":[{"event_id":"sha256:bf746e4deb33f70022872bf634555647ca4d3008cd318c046447320ea04afe48","target":"graph","created_at":"2026-05-18T00:27:52Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables ab","authors_text":"Philipp Winter, Prateek Mittal, Yih-Chun Hu, Yushan Liu, Zhuotao Liu","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-08-28T01:45:14Z","title":"TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1708.08162","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:d3514d6aae12b66d66fe35d1c3943b29210612a306398e65bc0c0ce3763ee01e","target":"record","created_at":"2026-05-18T00:27:52Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"a948a40a8c8f37fef26bf19f43b32c2443f31cd628d1727e070134c1eabd2e54","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-08-28T01:45:14Z","title_canon_sha256":"4483e51df7019792f11e1203845e29f4e9fd04c53e56396ff7a77693de42fb40"},"schema_version":"1.0","source":{"id":"1708.08162","kind":"arxiv","version":3}},"canonical_sha256":"8ae4907916365818b0cce86140934f546af790eb0b49c436d7e01e8692acab2d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"8ae4907916365818b0cce86140934f546af790eb0b49c436d7e01e8692acab2d","first_computed_at":"2026-05-18T00:27:52.290501Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:27:52.290501Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"TAP3xJDkkcwsgs7X3EESEkq8GfFQkmURgoRi2GrRoqIUUj2dm+/tI53L+iocA7xUzQD83Xc4I3JbeHsFHs+oBw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:27:52.290998Z","signed_message":"canonical_sha256_bytes"},"source_id":"1708.08162","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:d3514d6aae12b66d66fe35d1c3943b29210612a306398e65bc0c0ce3763ee01e","sha256:bf746e4deb33f70022872bf634555647ca4d3008cd318c046447320ea04afe48"],"state_sha256":"fcbc534a9a882c5755ce683ff5b10afc7a3cf84fa8a8d00aac42b8a0e3899456"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"gg58MAYD7qBhx+NQk9o/SSZ/Jza7wkT6PD3FbPUN+JIWJO5sUGCFHZakGci4VW7wcpi3Q7ua2Ea8wvGSEo5FBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T22:31:48.110273Z","bundle_sha256":"f4efcf317abddfc19deb84be4916446cf181d3b0fc33c1829296640810db4b4a"}}