YoVDO

Untrusted Onions - Is Tor Broken

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Machine Learning Courses Privacy Courses Bias Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Tor network security in this 24-minute conference talk from Circle City Con 2016. Delve into Joshua Galloway's research on untrusted onions and potential vulnerabilities in the Tor system. Learn about applied security measures, the inner workings of Tor, and various claims surrounding its effectiveness. Examine the role of machine learning in analyzing Tor traffic, distinguishing features of Tor circuits, and the concept of website fingerprinting. Gain insights into the limitations of website fingerprinting techniques, as well as the impact of bias and hypothesis space on Tor security analysis. Discover real-world examples that illustrate the challenges and complexities of maintaining anonymity in the Tor network.

Syllabus

Intro
Who am I
Why did I do this
How we applied security
How it works
Claims
Machine Learning
Distinguishing Features
Circuit Types
Website Fingerprinting
Website Fingerprinting Limitations
Bias and Hypothesis Space
Examples


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube