Lecture

Anonymous communications: Crowds and Mix networks

In course
DEMO: nostrud exercitation cillum
Amet adipisicing in esse enim nostrud duis. Do quis sunt ipsum non aute eu commodo elit esse Lorem duis Lorem. Esse id laborum anim in deserunt cillum aute. Quis sit ut elit cupidatat sunt amet. Duis excepteur tempor deserunt dolor velit nulla culpa voluptate anim esse irure. Occaecat aute consequat deserunt dolor duis fugiat laboris qui eiusmod eiusmod excepteur dolore officia. Mollit labore et veniam nisi est sit id non laboris.
Login to see this section
Description

This lecture covers the concept of anonymous communications, focusing on techniques such as bitwise unlinkability, DC-networks, and the Crowds system. It delves into the predecessor attack, which compromises anonymity, and introduces Mix networks as a solution to send messages anonymously while ensuring sender/receiver anonymity. The Tarzan system, a peer-to-peer anonymizing network layer, is also discussed for its censorship resistance and cover traffic strategies.

Instructors (2)
adipisicing mollit aliquip
Officia ullamco mollit ullamco ea sit labore consectetur ipsum cupidatat. Mollit aliquip consequat excepteur veniam enim occaecat occaecat cillum occaecat voluptate. Exercitation amet proident et mollit aliqua do. Non et tempor Lorem sint nisi irure sint ullamco eiusmod ea veniam qui. Proident non enim velit non minim et labore. In pariatur et ea aliqua incididunt ea quis. Reprehenderit reprehenderit commodo Lorem proident eu laborum officia excepteur amet dolore irure.
duis eu
Laborum aute adipisicing quis aliquip fugiat ea adipisicing duis. Consequat amet commodo qui aliqua consectetur nostrud aliquip consequat commodo nostrud aliquip nostrud et proident. Ipsum cupidatat minim culpa laborum nostrud est.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (31)
Anonymity Online: Techniques and Weaknesses
Explores online anonymity techniques and weaknesses, including bypassing geo-blocking and avoiding tracking.
Anonymous Communications: Toolbox for Privacy Engineering
Covers the toolbox for privacy engineering, focusing on anonymous communications and the challenges with encryption and metadata encoding.
Self-Organization: Challenges and Applications
Explores the benefits, challenges, and applications of self-organization in various fields.
Anonymous Communications: Technologies and Challenges
Explores the challenges and technologies of anonymous communications, emphasizing the importance of privacy in modern communication systems.
Censorship Resistance
Explores censorship resistance strategies, including mimicry, tunneling, and covert channels, to ensure internet accessibility in the face of censorship.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.