YoVDO

Cipherspaces and Darknets - An Overview of Attack Strategies

Offered By: YouTube

Tags

Network Security Courses Tor (The Onion Router) Courses Encryption Courses Privacy Courses Threat Modeling Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about attack strategies targeting cipherspaces and darknets in this 52-minute video lecture. Explore the threat model and adversaries relevant to anonymous networks like Tor. Examine encryption layers, DNS leak mitigation, and risks of accessing content outside darknets. Analyze real-world incidents involving metadata exploitation and timing correlation attacks. Gain insights into general mitigation techniques and ways to enhance privacy when using anonymity networks.

Syllabus

Intro
A little background...
Threat Model and Adversaries matter
Tor: The Onion Router
12P Encryption Layers
Silly Garlic Routing Animation
Overview
Mitigating DNS Leaks
Grabbing content outside of the Darkne
Another example, Bittorrent Issues
Yet Another Example: IRC Ident
General Mitigations
Clock Differences
Incidents: Pwned by Metadata
End point and exit point
Timing Correlation
Cut down needed checks


Related Courses

Security and Privacy in TOR Network
University of Colorado System via Coursera
The Complete Cyber Security Course : Anonymous Browsing!
Udemy
The Complete Ethical Hacking Course: Beginner to Advanced!
Udemy
The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy
Hacker Ético Profissional com Kali Linux v2023
Udemy