Tor and Circumvention: Lessons Learned, by Roger Dingledine
Offered By: TheIACR via YouTube
Course Description
Overview
Syllabus
Intro
What is Tor?
Threat model: what can the attacker do?
Anonymity isn't encryption: Encryption just protects contents.
Anonymity isn't just wishful thinking...
Anonymity serves different interests for different user groups.
Law enforcement needs anonymity to get the job done.
Journalists and activists need Tor for their personal safety
Current situation: Bad people on the Internet are doing fine
The simplest designs use a single relay to hide connections.
But a single relay (or eavesdropper!) is a single point of failure.
Alice makes a session key with R1 ...And then tunnels to R2...and to R3
The basic Tor design uses a simple centralized directory protocol.
How do you find a bridge?
Attacker's goals
What we're up against
Flash is dangerous too
Publicity attracts attention
Advocacy and education
Measuring bridge reachability
Other components
Taught by
TheIACR
Related Courses
Information Security - Advanced topicsNew York University (NYU) via edX The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy Ethical Hacking With Python, JavaScript and Kali Linux
Udemy Dark Web: Complete Introduction to the Deep/Dark Web 2023
Udemy Universidad Hacking. Todo en Ciberseguridad. Curso Completo
Udemy