Lecture

Censorship Resistance

Description

This lecture covers the concept of censorship resistance, focusing on the technical strategies to make the internet accessible and usable in the face of censorship. It discusses the goals of privacy technologies, the adversary's goals in preventing communication, and the two-step process of finding the flow and preventing communication. Various censorship resistance systems like Tor and techniques such as mimicry, tunneling, and covert channels are explored. The lecture also delves into the challenges and solutions in decoy routing, including systems like Telex and attacks on decoy routing.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.