Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cipherspaces and Darknets - An Overview of Attack Strategies

via YouTube

Overview

Learn about attack strategies targeting cipherspaces and darknets in this 52-minute video lecture. Explore the threat model and adversaries relevant to anonymous networks like Tor. Examine encryption layers, DNS leak mitigation, and risks of accessing content outside darknets. Analyze real-world incidents involving metadata exploitation and timing correlation attacks. Gain insights into general mitigation techniques and ways to enhance privacy when using anonymity networks.

Syllabus

Intro
A little background...
Threat Model and Adversaries matter
Tor: The Onion Router
12P Encryption Layers
Silly Garlic Routing Animation
Overview
Mitigating DNS Leaks
Grabbing content outside of the Darkne
Another example, Bittorrent Issues
Yet Another Example: IRC Ident
General Mitigations
Clock Differences
Incidents: Pwned by Metadata
End point and exit point
Timing Correlation
Cut down needed checks

Reviews

Start your review of Cipherspaces and Darknets - An Overview of Attack Strategies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.