Главная
Study mode:
on
1
Intro
2
Why people need anonymity
3
Why encryption doesnt work
4
Email remailers
5
Cypherpunk remailers
6
Example of Mixmaster
7
Mixmaster defenses
8
The problem with Mixminion
9
Open proxies
10
Demonstration
11
How Tor works
12
Internet censorship
13
Chinese censorship
14
China blocking Tor
15
Bridge addresses
16
China
17
Open problems
18
Censorship
19
Google
20
Tor Hidden Services
21
Anonymous Blacklisting
22
Tor Financial Report
23
The Tragedy of the Commons
Description:
Explore the evolution of anonymous communication systems on the Internet in this keynote address from AppSecEU 2014. Trace the history from early 80s email remailers to modern censorship-resistant networks like Tor. Examine how changing user priorities, technological advancements, and political realities have shaped the development of anonymity tools. Gain insights into the challenges faced by projects like Tor, including balancing privacy with usability and combating censorship attempts. Delve into topics such as cypherpunk remailers, Mixmaster defenses, open proxies, and Tor hidden services. Consider the future of anonymous communications and potential adaptations needed to address emerging threats and changing circumstances.

Anonymous Communications and Tor: History and Future Challenges

OWASP Foundation
Add to list
0:00 / 0:00