Cipherspaces and Darknets - An Overview of Attack Strategies
Offered By: YouTube
Course Description
Overview
Learn about attack strategies targeting cipherspaces and darknets in this 52-minute video lecture. Explore the threat model and adversaries relevant to anonymous networks like Tor. Examine encryption layers, DNS leak mitigation, and risks of accessing content outside darknets. Analyze real-world incidents involving metadata exploitation and timing correlation attacks. Gain insights into general mitigation techniques and ways to enhance privacy when using anonymity networks.
Syllabus
Intro
A little background...
Threat Model and Adversaries matter
Tor: The Onion Router
12P Encryption Layers
Silly Garlic Routing Animation
Overview
Mitigating DNS Leaks
Grabbing content outside of the Darkne
Another example, Bittorrent Issues
Yet Another Example: IRC Ident
General Mitigations
Clock Differences
Incidents: Pwned by Metadata
End point and exit point
Timing Correlation
Cut down needed checks
Related Courses
Internet History, Technology, and SecurityUniversity of Michigan via Coursera Sicherheit im Internet
openHPI أساسيات التشفير
Rwaq (رواق) Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera