YoVDO

TOR - Attacks and Countermeasures

Offered By: Security BSides London via YouTube

Tags

Security BSides Courses Cybersecurity Courses Tor (The Onion Router) Courses Network Infrastructure Courses Censorship Courses

Course Description

Overview

Explore the inner workings of the Tor anonymization network in this comprehensive conference talk from Security BSides London. Delve into the infrastructure and high-level protocol of Tor, including Hidden Services and their role in bypassing censorship. Examine attempts by countries like China and Iran to block Tor access and the countermeasures developed. Analyze various attacks against Tor users and network infrastructure, along with potential defenses. Investigate the FBI's takedown of Silk Road and the exploit used to deanonymize visitors to Tor hidden services. Gain insights into traffic confirmation attacks, distributed hash tables, and methods for deanonymizing hidden services and their users.

Syllabus

Intro
Overview
The problems
The Tor Ecosystem
Building circuits through Tor
Obvious attacks
Tor Censorship
How China blocks Tor
Tor Hidden Services
Distributed Hash Tables
Hidden Service popularity
Deanonymising Hidden Service users • Traffic confirmation attacks are MUCH more powerful.
Deanonymising Hidden Services


Taught by

Security BSides London

Related Courses

Cloud Networking
University of Illinois at Urbana-Champaign via Coursera
Google Cloud Fundamentals: Core Infrastructure em Português Brasileiro
Google Cloud via Coursera
Technological challenges of participatory smart cities
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Instalación y configuración de Microsoft Windows Server
Udemy
IoT Networking
University of Illinois at Urbana-Champaign via Coursera