Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the enumeration of Tor bridges, the challenges faced by the Tor project, and the strategies employed for censorship resistance. It delves into the techniques such as mimicry, tunneling, and covert channels used to avoid censorship. The focus then shifts to ScrambleSuit, a polymorphic network protocol integrated into Tor to circumvent censorship. The lecture explores how ScrambleSuit defends against active attacks, destroys patterns, and mimics whitelisted applications like Skype. It also discusses other censorship resistance systems like CensorSpoofer and SkypeMorph, highlighting their use of IP spoofing and VoIP traffic mimicry.