Tor and Circumvention: Lessons Learned, by Roger Dingledine
Offered By: TheIACR via YouTube
Course Description
Overview
Syllabus
Intro
What is Tor?
Threat model: what can the attacker do?
Anonymity isn't encryption: Encryption just protects contents.
Anonymity isn't just wishful thinking...
Anonymity serves different interests for different user groups.
Law enforcement needs anonymity to get the job done.
Journalists and activists need Tor for their personal safety
Current situation: Bad people on the Internet are doing fine
The simplest designs use a single relay to hide connections.
But a single relay (or eavesdropper!) is a single point of failure.
Alice makes a session key with R1 ...And then tunnels to R2...and to R3
The basic Tor design uses a simple centralized directory protocol.
How do you find a bridge?
Attacker's goals
What we're up against
Flash is dangerous too
Publicity attracts attention
Advocacy and education
Measuring bridge reachability
Other components
Taught by
TheIACR
Related Courses
ICLab - A Global, Longitudinal Internet Censorship Measurement PlatformIEEE via YouTube Digital Safety for Politically Vulnerable Organizations
Cooper via YouTube Cat & Mouse - Evading the Censors in 2018
media.ccc.de via YouTube How We Take Back the Internet
TED via YouTube Practical Censorship Evasion Leveraging Content Delivery Networks
Association for Computing Machinery (ACM) via YouTube