Lecture

Censorship Resistance

Description

This lecture covers techniques for censorship resistance in the Internet, including CensorSpoofer, imitation flaws, and solutions like CloudTransport and CovertCast. It also discusses decoy routing, Telex, and attacks on decoy routing.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.