Главная
Study mode:
on
1
Intro
2
A little background...
3
Threat Model and Adversaries matter
4
Tor: The Onion Router
5
12P Encryption Layers
6
Silly Garlic Routing Animation
7
Overview
8
Mitigating DNS Leaks
9
Grabbing content outside of the Darkne
10
Another example, Bittorrent Issues
11
Yet Another Example: IRC Ident
12
General Mitigations
13
Clock Differences
14
Incidents: Pwned by Metadata
15
End point and exit point
16
Timing Correlation
17
Cut down needed checks
Description:
Learn about attack strategies targeting cipherspaces and darknets in this 52-minute video lecture. Explore the threat model and adversaries relevant to anonymous networks like Tor. Examine encryption layers, DNS leak mitigation, and risks of accessing content outside darknets. Analyze real-world incidents involving metadata exploitation and timing correlation attacks. Gain insights into general mitigation techniques and ways to enhance privacy when using anonymity networks.

Cipherspaces and Darknets - An Overview of Attack Strategies

Add to list
0:00 / 0:00