Overview
Explore the evolution of anonymous communication systems on the Internet in this keynote address from AppSecEU 2014. Trace the history from early 80s email remailers to modern censorship-resistant networks like Tor. Examine how changing user priorities, technological advancements, and political realities have shaped the development of anonymity tools. Gain insights into the challenges faced by projects like Tor, including balancing privacy with usability and combating censorship attempts. Delve into topics such as cypherpunk remailers, Mixmaster defenses, open proxies, and Tor hidden services. Consider the future of anonymous communications and potential adaptations needed to address emerging threats and changing circumstances.
Syllabus
Intro
Why people need anonymity
Why encryption doesnt work
Email remailers
Cypherpunk remailers
Example of Mixmaster
Mixmaster defenses
The problem with Mixminion
Open proxies
Demonstration
How Tor works
Internet censorship
Chinese censorship
China blocking Tor
Bridge addresses
China
Open problems
Censorship
Google
Tor Hidden Services
Anonymous Blacklisting
Tor Financial Report
The Tragedy of the Commons
Taught by
OWASP Foundation