Difference between revisions of "Privacy:workshop:2013-10-17"
Line 11: | Line 11: | ||
Subject: | Subject: | ||
* anonymizing traffic | * anonymizing traffic | ||
+ | |||
+ | - initial list of tor node from directory service | ||
+ | - tor relay, just forwards traffic to other tor node | ||
+ | - exit node, send traffic to internet | ||
+ | - (hidden) bridges, entries to tor network | ||
+ | |||
+ | - trust levels? | ||
+ | - hidden service, connects to a tor (rendezvous point) node, registers with dire | ||
+ | ctory service. | ||
+ | |||
+ | - traffic analysis? | ||
+ | |||
+ | - risks of running exit nodes: police investigation ends up at your doorstep. | ||
+ | |||
+ | - risk of getting hacked by the NSA? Inject extra URLs that exploit browsers | ||
+ | - by the FBI? | ||
+ | - took over hidden tor servers | ||
+ | |||
+ | |||
* bitcoins | * bitcoins | ||
[[Category:Privacy]] | [[Category:Privacy]] |
Revision as of 21:30, 17 October 2013
Privacy:workshop:2013-10-17 | |
---|---|
Date | 2013/10/17 |
Time | |
Location | (h)ACTA |
Type | Workshop |
Contact | User:Phicoh |
Privacy Software Workshop, Episode 5
Start 20:00
Subject:
- anonymizing traffic
- initial list of tor node from directory service - tor relay, just forwards traffic to other tor node - exit node, send traffic to internet - (hidden) bridges, entries to tor network
- trust levels? - hidden service, connects to a tor (rendezvous point) node, registers with dire ctory service.
- traffic analysis?
- risks of running exit nodes: police investigation ends up at your doorstep.
- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
- by the FBI? - took over hidden tor servers
- bitcoins