Tor and Circumvention: Lessons Learned, by Roger Dingledine
Offered By: TheIACR via YouTube
Course Description
Overview
Syllabus
Intro
What is Tor?
Threat model: what can the attacker do?
Anonymity isn't encryption: Encryption just protects contents.
Anonymity isn't just wishful thinking...
Anonymity serves different interests for different user groups.
Law enforcement needs anonymity to get the job done.
Journalists and activists need Tor for their personal safety
Current situation: Bad people on the Internet are doing fine
The simplest designs use a single relay to hide connections.
But a single relay (or eavesdropper!) is a single point of failure.
Alice makes a session key with R1 ...And then tunnels to R2...and to R3
The basic Tor design uses a simple centralized directory protocol.
How do you find a bridge?
Attacker's goals
What we're up against
Flash is dangerous too
Publicity attracts attention
Advocacy and education
Measuring bridge reachability
Other components
Taught by
TheIACR
Related Courses
Kali Linux Deep DiveA Cloud Guru Créer des connexions sécurisées avec Tor pour l'anonymat
Coursera Project Network via Coursera Créer une connexion sécurisée avec Tor
Coursera Project Network via Coursera Guide to the Tor Browser
Cybrary Linux Essentials for Ethical Hackers - Full InfoSec Course
freeCodeCamp