Difference between revisions of "Privacy:workshop:2013-10-17"
Line 12: | Line 12: | ||
* anonymizing traffic | * anonymizing traffic | ||
− | + | ** initial list of tor node from directory service | |
− | + | ** tor relay, just forwards traffic to other tor node | |
− | + | ** exit node, send traffic to internet | |
− | + | ** (hidden) bridges, entries to tor network | |
− | + | ** trust levels? | |
− | + | ** hidden service, connects to a tor (rendezvous point) node, registers with dire | |
ctory service. | ctory service. | ||
− | + | ** traffic analysis? | |
− | + | ** risks of running exit nodes: police investigation ends up at your doorstep. | |
− | + | ** risk of getting hacked by the NSA? Inject extra URLs that exploit browsers | |
− | + | *** by the FBI? | |
− | + | **** took over hidden tor servers | |
Latest revision as of 21:31, 17 October 2013
Privacy:workshop:2013-10-17 | |
---|---|
Date | 2013/10/17 |
Time | |
Location | (h)ACTA |
Type | Workshop |
Contact | User:Phicoh |
Privacy Software Workshop, Episode 5
Start 20:00
Subject:
- anonymizing traffic
- initial list of tor node from directory service
- tor relay, just forwards traffic to other tor node
- exit node, send traffic to internet
- (hidden) bridges, entries to tor network
- trust levels?
- hidden service, connects to a tor (rendezvous point) node, registers with dire
ctory service.
- traffic analysis?
- risks of running exit nodes: police investigation ends up at your doorstep.
- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
- by the FBI?
- took over hidden tor servers
- by the FBI?
- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
- bitcoins