Overview
Learn about attack strategies targeting cipherspaces and darknets in this 52-minute video lecture. Explore the threat model and adversaries relevant to anonymous networks like Tor. Examine encryption layers, DNS leak mitigation, and risks of accessing content outside darknets. Analyze real-world incidents involving metadata exploitation and timing correlation attacks. Gain insights into general mitigation techniques and ways to enhance privacy when using anonymity networks.
Syllabus
Intro
A little background...
Threat Model and Adversaries matter
Tor: The Onion Router
12P Encryption Layers
Silly Garlic Routing Animation
Overview
Mitigating DNS Leaks
Grabbing content outside of the Darkne
Another example, Bittorrent Issues
Yet Another Example: IRC Ident
General Mitigations
Clock Differences
Incidents: Pwned by Metadata
End point and exit point
Timing Correlation
Cut down needed checks