Difference between revisions of "Privacy:workshop:2013-10-17"

From Technologia Incognita
Jump to: navigation, search
Line 11: Line 11:
 
Subject:
 
Subject:
 
* anonymizing traffic
 
* anonymizing traffic
 +
 +
- initial list of tor node from directory service
 +
- tor relay, just forwards traffic to other tor node
 +
- exit node, send traffic to internet
 +
- (hidden) bridges, entries to tor network
 +
 +
- trust levels?
 +
- hidden service, connects to a tor (rendezvous point) node, registers with dire
 +
ctory service.
 +
 +
- traffic analysis?
 +
 +
- risks of running exit nodes: police investigation ends up at your doorstep.
 +
 +
- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
 +
  - by the FBI?
 +
    - took over hidden tor servers
 +
 +
 
* bitcoins
 
* bitcoins
  
 
[[Category:Privacy]]
 
[[Category:Privacy]]

Revision as of 22:30, 17 October 2013

Privacy:workshop:2013-10-17
Date 2013/10/17
Time
Location (h)ACTA
Type Workshop
Contact User:Phicoh

Privacy Software Workshop, Episode 5

Start 20:00

Subject:

  • anonymizing traffic

- initial list of tor node from directory service - tor relay, just forwards traffic to other tor node - exit node, send traffic to internet - (hidden) bridges, entries to tor network

- trust levels? - hidden service, connects to a tor (rendezvous point) node, registers with dire ctory service.

- traffic analysis?

- risks of running exit nodes: police investigation ends up at your doorstep.

- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers

 - by the FBI?
   - took over hidden tor servers


  • bitcoins