Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about attack strategies targeting cipherspaces and darknets in this 52-minute video lecture. Explore the threat model and adversaries relevant to anonymous networks like Tor. Examine encryption layers, DNS leak mitigation, and risks of accessing content outside darknets. Analyze real-world incidents involving metadata exploitation and timing correlation attacks. Gain insights into general mitigation techniques and ways to enhance privacy when using anonymity networks.
Syllabus
Intro
A little background...
Threat Model and Adversaries matter
Tor: The Onion Router
12P Encryption Layers
Silly Garlic Routing Animation
Overview
Mitigating DNS Leaks
Grabbing content outside of the Darkne
Another example, Bittorrent Issues
Yet Another Example: IRC Ident
General Mitigations
Clock Differences
Incidents: Pwned by Metadata
End point and exit point
Timing Correlation
Cut down needed checks