Difference between revisions of "Privacy:workshop:2013-10-17"
(Created page with "{{Event |Date=2013/10/17 |Location=TechInc }}") |
|||
(4 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Event | {{Event | ||
|Date=2013/10/17 | |Date=2013/10/17 | ||
− | |Location= | + | |Location=(h)ACTA |
+ | |EventType=Workshop | ||
+ | |Contact=User:Phicoh | ||
}} | }} | ||
+ | Privacy Software Workshop, Episode 5 | ||
+ | |||
+ | Start 20:00 | ||
+ | |||
+ | Subject: | ||
+ | * anonymizing traffic | ||
+ | |||
+ | ** initial list of tor node from directory service | ||
+ | ** tor relay, just forwards traffic to other tor node | ||
+ | ** exit node, send traffic to internet | ||
+ | ** (hidden) bridges, entries to tor network | ||
+ | |||
+ | ** trust levels? | ||
+ | ** hidden service, connects to a tor (rendezvous point) node, registers with dire | ||
+ | ctory service. | ||
+ | |||
+ | ** traffic analysis? | ||
+ | |||
+ | ** risks of running exit nodes: police investigation ends up at your doorstep. | ||
+ | |||
+ | ** risk of getting hacked by the NSA? Inject extra URLs that exploit browsers | ||
+ | *** by the FBI? | ||
+ | **** took over hidden tor servers | ||
+ | |||
+ | |||
+ | * bitcoins | ||
+ | |||
+ | [[Category:Privacy]] |
Latest revision as of 21:31, 17 October 2013
Privacy:workshop:2013-10-17 | |
---|---|
Date | 2013/10/17 |
Time | |
Location | (h)ACTA |
Type | Workshop |
Contact | User:Phicoh |
Privacy Software Workshop, Episode 5
Start 20:00
Subject:
- anonymizing traffic
- initial list of tor node from directory service
- tor relay, just forwards traffic to other tor node
- exit node, send traffic to internet
- (hidden) bridges, entries to tor network
- trust levels?
- hidden service, connects to a tor (rendezvous point) node, registers with dire
ctory service.
- traffic analysis?
- risks of running exit nodes: police investigation ends up at your doorstep.
- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
- by the FBI?
- took over hidden tor servers
- by the FBI?
- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
- bitcoins