Tor and Circumvention: Lessons Learned, by Roger Dingledine

Tor and Circumvention: Lessons Learned, by Roger Dingledine

TheIACR via YouTube Direct link

Measuring bridge reachability

20 of 21

20 of 21

Measuring bridge reachability

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Tor and Circumvention: Lessons Learned, by Roger Dingledine

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is Tor?
  3. 3 Threat model: what can the attacker do?
  4. 4 Anonymity isn't encryption: Encryption just protects contents.
  5. 5 Anonymity isn't just wishful thinking...
  6. 6 Anonymity serves different interests for different user groups.
  7. 7 Law enforcement needs anonymity to get the job done.
  8. 8 Journalists and activists need Tor for their personal safety
  9. 9 Current situation: Bad people on the Internet are doing fine
  10. 10 The simplest designs use a single relay to hide connections.
  11. 11 But a single relay (or eavesdropper!) is a single point of failure.
  12. 12 Alice makes a session key with R1 ...And then tunnels to R2...and to R3
  13. 13 The basic Tor design uses a simple centralized directory protocol.
  14. 14 How do you find a bridge?
  15. 15 Attacker's goals
  16. 16 What we're up against
  17. 17 Flash is dangerous too
  18. 18 Publicity attracts attention
  19. 19 Advocacy and education
  20. 20 Measuring bridge reachability
  21. 21 Other components

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.