Anonymity in Decentralized SystemsExplores the significance of anonymity in decentralized systems, discussing threats to online privacy and strategies for achieving anonymity.
Anonymous CommunicationsDelves into anonymous communication systems, discussing Herbivore protocol, statistical disclosure attacks, Crowds system, and anonymity analysis.
Network Security: Other ProtectionsExplores network security through NAT, firewalls, and deep packet inspection, emphasizing the importance of robust host-level defenses and the limitations of protection techniques.
Networks Out of ControlExplores missed tech trends, network scaling laws, routing in wireless networks, network privacy, and correlations in spatial data.
Networks: IP ProtocolExplores the Internet Protocol (IP), BFS algorithm, routing tables, and IPv4 addresses.