Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Untrusted Onions - Is Tor Broken

via YouTube

Overview

Explore the intricacies of Tor network security in this 24-minute conference talk from Circle City Con 2016. Delve into Joshua Galloway's research on untrusted onions and potential vulnerabilities in the Tor system. Learn about applied security measures, the inner workings of Tor, and various claims surrounding its effectiveness. Examine the role of machine learning in analyzing Tor traffic, distinguishing features of Tor circuits, and the concept of website fingerprinting. Gain insights into the limitations of website fingerprinting techniques, as well as the impact of bias and hypothesis space on Tor security analysis. Discover real-world examples that illustrate the challenges and complexities of maintaining anonymity in the Tor network.

Syllabus

Intro
Who am I
Why did I do this
How we applied security
How it works
Claims
Machine Learning
Distinguishing Features
Circuit Types
Website Fingerprinting
Website Fingerprinting Limitations
Bias and Hypothesis Space
Examples

Reviews

Start your review of Untrusted Onions - Is Tor Broken

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.