Difference between revisions of "Privacy:workshop:2013-10-17"

From Technologia Incognita
Jump to: navigation, search
 
Line 12: Line 12:
 
* anonymizing traffic
 
* anonymizing traffic
  
- initial list of tor node from directory service
+
** initial list of tor node from directory service
- tor relay, just forwards traffic to other tor node
+
** tor relay, just forwards traffic to other tor node
- exit node, send traffic to internet
+
** exit node, send traffic to internet
- (hidden) bridges, entries to tor network
+
** (hidden) bridges, entries to tor network
  
- trust levels?
+
** trust levels?
- hidden service, connects to a tor (rendezvous point) node, registers with dire
+
** hidden service, connects to a tor (rendezvous point) node, registers with dire
 
ctory service.
 
ctory service.
  
- traffic analysis?
+
** traffic analysis?
  
- risks of running exit nodes: police investigation ends up at your doorstep.
+
** risks of running exit nodes: police investigation ends up at your doorstep.
  
- risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
+
** risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
  - by the FBI?
+
*** by the FBI?
    - took over hidden tor servers
+
**** took over hidden tor servers
  
  

Latest revision as of 22:31, 17 October 2013

Privacy:workshop:2013-10-17
Date 2013/10/17
Time
Location (h)ACTA
Type Workshop
Contact User:Phicoh

Privacy Software Workshop, Episode 5

Start 20:00

Subject:

  • anonymizing traffic
    • initial list of tor node from directory service
    • tor relay, just forwards traffic to other tor node
    • exit node, send traffic to internet
    • (hidden) bridges, entries to tor network
    • trust levels?
    • hidden service, connects to a tor (rendezvous point) node, registers with dire

ctory service.

    • traffic analysis?
    • risks of running exit nodes: police investigation ends up at your doorstep.
    • risk of getting hacked by the NSA? Inject extra URLs that exploit browsers
      • by the FBI?
        • took over hidden tor servers


  • bitcoins