Untrusted Onions - Is Tor Broken
Offered By: YouTube
Course Description
Overview
Explore the intricacies of Tor network security in this 24-minute conference talk from Circle City Con 2016. Delve into Joshua Galloway's research on untrusted onions and potential vulnerabilities in the Tor system. Learn about applied security measures, the inner workings of Tor, and various claims surrounding its effectiveness. Examine the role of machine learning in analyzing Tor traffic, distinguishing features of Tor circuits, and the concept of website fingerprinting. Gain insights into the limitations of website fingerprinting techniques, as well as the impact of bias and hypothesis space on Tor security analysis. Discover real-world examples that illustrate the challenges and complexities of maintaining anonymity in the Tor network.
Syllabus
Intro
Who am I
Why did I do this
How we applied security
How it works
Claims
Machine Learning
Distinguishing Features
Circuit Types
Website Fingerprinting
Website Fingerprinting Limitations
Bias and Hypothesis Space
Examples
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network