Three Ways to Enhance Metadata Protection Beyond Tor - 34C3 ChaosWest
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore three innovative approaches to enhance metadata protection beyond Tor in this 19-minute conference talk from 34C3 ChaosWest. Delve into cover traffic techniques utilizing file sharing, DHT, and multicast; examine the framing of application data; and investigate mixnets for high-latency applications. Learn about the importance of these methods, their applications in low-latency scenarios, and the concept of constant bandwidth. Discover dedicated applications like Gluenet and understand the limitations of Mix Networks. Gain valuable insights into advanced anonymity techniques and participate in a Q&A session to further your understanding of metadata protection strategies.
Syllabus
Introduction
Presentation
Why is it important
Low latency applications
Constant bandwidth
Dedicated applications
Gluenet
Mix Networks
Mix Networks Limitations
Questions
Taught by
media.ccc.de
Related Courses
Linux File SharingA Cloud Guru LPIC-2: Linux Engineer Exam 202
A Cloud Guru LPIC-2: Linux Engineer Exam 202-450 Preparation
A Cloud Guru AWS Storage Gateway: Configuração, definição e monitoramento do S3 File Gateway (Português) | AWS Storage Gateway: S3 File Gateway Setup, Configuration, and Monitoring (Portuguese)
Amazon Web Services via AWS Skill Builder Building Digital Media using Graphic Design in Libre Impress
Coursera Project Network via Coursera