Главная
Study mode:
on
1
Intro
2
Who am I
3
Why did I do this
4
How we applied security
5
How it works
6
Claims
7
Machine Learning
8
Distinguishing Features
9
Circuit Types
10
Website Fingerprinting
11
Website Fingerprinting Limitations
12
Bias and Hypothesis Space
13
Examples
Description:
Explore the intricacies of Tor network security in this 24-minute conference talk from Circle City Con 2016. Delve into Joshua Galloway's research on untrusted onions and potential vulnerabilities in the Tor system. Learn about applied security measures, the inner workings of Tor, and various claims surrounding its effectiveness. Examine the role of machine learning in analyzing Tor traffic, distinguishing features of Tor circuits, and the concept of website fingerprinting. Gain insights into the limitations of website fingerprinting techniques, as well as the impact of bias and hypothesis space on Tor security analysis. Discover real-world examples that illustrate the challenges and complexities of maintaining anonymity in the Tor network.

Untrusted Onions - Is Tor Broken

Add to list