Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

TOR - Attacks and Countermeasures

Security BSides London via YouTube

Overview

Explore the inner workings of the Tor anonymization network in this comprehensive conference talk from Security BSides London. Delve into the infrastructure and high-level protocol of Tor, including Hidden Services and their role in bypassing censorship. Examine attempts by countries like China and Iran to block Tor access and the countermeasures developed. Analyze various attacks against Tor users and network infrastructure, along with potential defenses. Investigate the FBI's takedown of Silk Road and the exploit used to deanonymize visitors to Tor hidden services. Gain insights into traffic confirmation attacks, distributed hash tables, and methods for deanonymizing hidden services and their users.

Syllabus

Intro
Overview
The problems
The Tor Ecosystem
Building circuits through Tor
Obvious attacks
Tor Censorship
How China blocks Tor
Tor Hidden Services
Distributed Hash Tables
Hidden Service popularity
Deanonymising Hidden Service users • Traffic confirmation attacks are MUCH more powerful.
Deanonymising Hidden Services

Taught by

Security BSides London

Reviews

Start your review of TOR - Attacks and Countermeasures

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.