Explore the intricacies of Tor network security in this 24-minute conference talk from Circle City Con 2016. Delve into Joshua Galloway's research on untrusted onions and potential vulnerabilities in the Tor system. Learn about applied security measures, the inner workings of Tor, and various claims surrounding its effectiveness. Examine the role of machine learning in analyzing Tor traffic, distinguishing features of Tor circuits, and the concept of website fingerprinting. Gain insights into the limitations of website fingerprinting techniques, as well as the impact of bias and hypothesis space on Tor security analysis. Discover real-world examples that illustrate the challenges and complexities of maintaining anonymity in the Tor network.
Overview
Syllabus
Intro
Who am I
Why did I do this
How we applied security
How it works
Claims
Machine Learning
Distinguishing Features
Circuit Types
Website Fingerprinting
Website Fingerprinting Limitations
Bias and Hypothesis Space
Examples