YoVDO

TOR - Attacks and Countermeasures

Offered By: Security BSides London via YouTube

Tags

Security BSides Courses Cybersecurity Courses Tor (The Onion Router) Courses Network Infrastructure Courses Censorship Courses

Course Description

Overview

Explore the inner workings of the Tor anonymization network in this comprehensive conference talk from Security BSides London. Delve into the infrastructure and high-level protocol of Tor, including Hidden Services and their role in bypassing censorship. Examine attempts by countries like China and Iran to block Tor access and the countermeasures developed. Analyze various attacks against Tor users and network infrastructure, along with potential defenses. Investigate the FBI's takedown of Silk Road and the exploit used to deanonymize visitors to Tor hidden services. Gain insights into traffic confirmation attacks, distributed hash tables, and methods for deanonymizing hidden services and their users.

Syllabus

Intro
Overview
The problems
The Tor Ecosystem
Building circuits through Tor
Obvious attacks
Tor Censorship
How China blocks Tor
Tor Hidden Services
Distributed Hash Tables
Hidden Service popularity
Deanonymising Hidden Service users • Traffic confirmation attacks are MUCH more powerful.
Deanonymising Hidden Services


Taught by

Security BSides London

Related Courses

The Tabernacle in Word & Image: An Italian Jewish Manuscript Revealed
University of Pennsylvania via edX
Text, Textuality and Digital Media
Indian Institute of Technology Delhi via Swayam
Freedom of Expression and Information in the Time of Globalization: Advanced Course
Columbia University via edX
Liberté D'expression: Normes, Fondements, Enjeux
Téluq via Independent
Judy Blume Teaches Writing
MasterClass