Lecture

Censorship Resistance

Description

This lecture covers the concept of censorship resistance in privacy technologies, focusing on self-determination, freedom of speech, and information. It explains the techniques to avoid Internet censorship through re-routing and encryption, the adversary's goals, the 2-step process of preventing communication, and the different forms of censorship like direct censor, performance degradation, and corrupt routing. The lecture also discusses censorship resistance systems, the communication establishment phase, and the strategies used to make it difficult for censors to block communication. Examples such as Tor and its directory authorities are presented to illustrate how censorship resistance systems work.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.