From Technologia Incognita
Jump to: navigation, search
Date 2013/10/17
Location (h)ACTA
Type Workshop
Contact User:Phicoh

Privacy Software Workshop, Episode 5

Start 20:00


  • anonymizing traffic
    • initial list of tor node from directory service
    • tor relay, just forwards traffic to other tor node
    • exit node, send traffic to internet
    • (hidden) bridges, entries to tor network
    • trust levels?
    • hidden service, connects to a tor (rendezvous point) node, registers with dire

ctory service.

    • traffic analysis?
    • risks of running exit nodes: police investigation ends up at your doorstep.
    • risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
      • by the FBI?
        • took over hidden tor servers

  • bitcoins