Difference between revisions of "Privacy:workshop:2013-10-17"
(3 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
|Location=(h)ACTA | |Location=(h)ACTA | ||
|EventType=Workshop | |EventType=Workshop | ||
− | |Contact=Phicoh | + | |Contact=User:Phicoh |
}} | }} | ||
Privacy Software Workshop, Episode 5 | Privacy Software Workshop, Episode 5 | ||
+ | |||
+ | Start 20:00 | ||
Subject: | Subject: | ||
* anonymizing traffic | * anonymizing traffic | ||
+ | |||
+ | ** initial list of tor node from directory service | ||
+ | ** tor relay, just forwards traffic to other tor node | ||
+ | ** exit node, send traffic to internet | ||
+ | ** (hidden) bridges, entries to tor network | ||
+ | |||
+ | ** trust levels? | ||
+ | ** hidden service, connects to a tor (rendezvous point) node, registers with dire | ||
+ | ctory service. | ||
+ | |||
+ | ** traffic analysis? | ||
+ | |||
+ | ** risks of running exit nodes: police investigation ends up at your doorstep. | ||
+ | |||
+ | ** risk of getting hacked by the NSA? Inject extra URLs that exploit browsers | ||
+ | *** by the FBI? | ||
+ | **** took over hidden tor servers | ||
+ | |||
+ | |||
* bitcoins | * bitcoins | ||
[[Category:Privacy]] | [[Category:Privacy]] |
Latest revision as of 21:31, 17 October 2013
Privacy:workshop:2013-10-17 | |
---|---|
Date | 2013/10/17 |
Time | |
Location | (h)ACTA |
Type | Workshop |
Contact | User:Phicoh |
Privacy Software Workshop, Episode 5
Start 20:00
Subject:
- anonymizing traffic
- initial list of tor node from directory service
- tor relay, just forwards traffic to other tor node
- exit node, send traffic to internet
- (hidden) bridges, entries to tor network
- trust levels?
- hidden service, connects to a tor (rendezvous point) node, registers with dire
ctory service.
- traffic analysis?
- risks of running exit nodes: police investigation ends up at your doorstep.
- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
- by the FBI?
- took over hidden tor servers
- by the FBI?
- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
- bitcoins