Difference between revisions of "Privacy:workshop:2013-10-17"

From Technologia Incognita
Jump to: navigation, search
 
(One intermediate revision by the same user not shown)
Line 11: Line 11:
 
Subject:
 
Subject:
 
* anonymizing traffic
 
* anonymizing traffic
 +
 +
** initial list of tor node from directory service
 +
** tor relay, just forwards traffic to other tor node
 +
** exit node, send traffic to internet
 +
** (hidden) bridges, entries to tor network
 +
 +
** trust levels?
 +
** hidden service, connects to a tor (rendezvous point) node, registers with dire
 +
ctory service.
 +
 +
** traffic analysis?
 +
 +
** risks of running exit nodes: police investigation ends up at your doorstep.
 +
 +
** risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
 +
*** by the FBI?
 +
**** took over hidden tor servers
 +
 +
 
* bitcoins
 
* bitcoins
  
 
[[Category:Privacy]]
 
[[Category:Privacy]]

Latest revision as of 21:31, 17 October 2013

Privacy:workshop:2013-10-17
Date 2013/10/17
Time
Location (h)ACTA
Type Workshop
Contact User:Phicoh

Privacy Software Workshop, Episode 5

Start 20:00

Subject:

  • anonymizing traffic
    • initial list of tor node from directory service
    • tor relay, just forwards traffic to other tor node
    • exit node, send traffic to internet
    • (hidden) bridges, entries to tor network
    • trust levels?
    • hidden service, connects to a tor (rendezvous point) node, registers with dire

ctory service.

    • traffic analysis?
    • risks of running exit nodes: police investigation ends up at your doorstep.
    • risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
      • by the FBI?
        • took over hidden tor servers


  • bitcoins