Measuring and Monitoring the Tor Network: Privacy Risks and Transparency Challenges
This content delves into the complexities of measuring and monitoring the Tor network, highlighting the inherent privacy risks and transparency challenges involved. It discusses issues such as deanonymization, storing sensitive data at relays, and the potential for leaks and compromises. The importa
6 views • 25 slides
Deanonymization of TOR HTTP Hidden Services - Techniques and Defense
This detailed content delves into the deanonymization of TOR HTTP hidden services, discussing known techniques, downgrading the protocol, and potential fixes. It covers the concept of hidden services, key certificate risks, search methods, and Gzip compression vulnerabilities. The author, a security
0 views • 32 slides
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
This presentation by Abdusamatov Somon explores targeted deanonymization through cache side-channel attacks, focusing on leaky resource attacks and cache-based side-channel attacks. It discusses the motivation behind these attacks, methods employed, potential defenses, and the evaluation of such att
0 views • 16 slides