Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the concept of censorship resistance in privacy technologies, focusing on self-determination, freedom of speech, and information. It explains the techniques to avoid Internet censorship through re-routing and encryption, the adversary's goals, the 2-step process of preventing communication, and the different forms of censorship like direct censor, performance degradation, and corrupt routing. The lecture also discusses censorship resistance systems, the communication establishment phase, and the strategies used to make it difficult for censors to block communication. Examples such as Tor and its directory authorities are presented to illustrate how censorship resistance systems work.