Cipherspaces and Darknets - An Overview of Attack Strategies
Offered By: YouTube
Course Description
Overview
Learn about attack strategies targeting cipherspaces and darknets in this 52-minute video lecture. Explore the threat model and adversaries relevant to anonymous networks like Tor. Examine encryption layers, DNS leak mitigation, and risks of accessing content outside darknets. Analyze real-world incidents involving metadata exploitation and timing correlation attacks. Gain insights into general mitigation techniques and ways to enhance privacy when using anonymity networks.
Syllabus
Intro
A little background...
Threat Model and Adversaries matter
Tor: The Onion Router
12P Encryption Layers
Silly Garlic Routing Animation
Overview
Mitigating DNS Leaks
Grabbing content outside of the Darkne
Another example, Bittorrent Issues
Yet Another Example: IRC Ident
General Mitigations
Clock Differences
Incidents: Pwned by Metadata
End point and exit point
Timing Correlation
Cut down needed checks
Related Courses
Security and Privacy in TOR NetworkUniversity of Colorado System via Coursera The Complete Cyber Security Course : Anonymous Browsing!
Udemy The Complete Ethical Hacking Course: Beginner to Advanced!
Udemy The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy Hacker Ético Profissional com Kali Linux v2023
Udemy