Главная
Study mode:
on
1
Introduction
2
Presentation
3
Why is it important
4
Low latency applications
5
Constant bandwidth
6
Dedicated applications
7
Gluenet
8
Mix Networks
9
Mix Networks Limitations
10
Questions
Description:
Explore three innovative approaches to enhance metadata protection beyond Tor in this 19-minute conference talk from 34C3 ChaosWest. Delve into cover traffic techniques utilizing file sharing, DHT, and multicast; examine the framing of application data; and investigate mixnets for high-latency applications. Learn about the importance of these methods, their applications in low-latency scenarios, and the concept of constant bandwidth. Discover dedicated applications like Gluenet and understand the limitations of Mix Networks. Gain valuable insights into advanced anonymity techniques and participate in a Q&A session to further your understanding of metadata protection strategies.

Three Ways to Enhance Metadata Protection Beyond Tor - 34C3 ChaosWest

media.ccc.de
Add to list