YoVDO

Three Ways to Enhance Metadata Protection Beyond Tor - 34C3 ChaosWest

Offered By: media.ccc.de via YouTube

Tags

Conference Talks Courses Tor (The Onion Router) Courses Multicast Courses File Sharing Courses

Course Description

Overview

Explore three innovative approaches to enhance metadata protection beyond Tor in this 19-minute conference talk from 34C3 ChaosWest. Delve into cover traffic techniques utilizing file sharing, DHT, and multicast; examine the framing of application data; and investigate mixnets for high-latency applications. Learn about the importance of these methods, their applications in low-latency scenarios, and the concept of constant bandwidth. Discover dedicated applications like Gluenet and understand the limitations of Mix Networks. Gain valuable insights into advanced anonymity techniques and participate in a Q&A session to further your understanding of metadata protection strategies.

Syllabus

Introduction
Presentation
Why is it important
Low latency applications
Constant bandwidth
Dedicated applications
Gluenet
Mix Networks
Mix Networks Limitations
Questions


Taught by

media.ccc.de

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube