Difference between revisions of "Privacy:workshop:2013-10-17"

From Technologia Incognita
Jump to: navigation, search
(Created page with "{{Event |Date=2013/10/17 |Location=TechInc }}")
 
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{Event
 
{{Event
 
|Date=2013/10/17
 
|Date=2013/10/17
|Location=TechInc
+
|Location=(h)ACTA
 +
|EventType=Workshop
 +
|Contact=User:Phicoh
 
}}
 
}}
 +
Privacy Software Workshop, Episode 5
 +
 +
Start 20:00
 +
 +
Subject:
 +
* anonymizing traffic
 +
 +
** initial list of tor node from directory service
 +
** tor relay, just forwards traffic to other tor node
 +
** exit node, send traffic to internet
 +
** (hidden) bridges, entries to tor network
 +
 +
** trust levels?
 +
** hidden service, connects to a tor (rendezvous point) node, registers with dire
 +
ctory service.
 +
 +
** traffic analysis?
 +
 +
** risks of running exit nodes: police investigation ends up at your doorstep.
 +
 +
** risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
 +
*** by the FBI?
 +
**** took over hidden tor servers
 +
 +
 +
* bitcoins
 +
 +
[[Category:Privacy]]

Latest revision as of 21:31, 17 October 2013

Privacy:workshop:2013-10-17
Date 2013/10/17
Time
Location (h)ACTA
Type Workshop
Contact User:Phicoh

Privacy Software Workshop, Episode 5

Start 20:00

Subject:

  • anonymizing traffic
    • initial list of tor node from directory service
    • tor relay, just forwards traffic to other tor node
    • exit node, send traffic to internet
    • (hidden) bridges, entries to tor network
    • trust levels?
    • hidden service, connects to a tor (rendezvous point) node, registers with dire

ctory service.

    • traffic analysis?
    • risks of running exit nodes: police investigation ends up at your doorstep.
    • risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
      • by the FBI?
        • took over hidden tor servers


  • bitcoins