Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the concept of censorship resistance, focusing on the technical strategies to make the internet accessible and usable in the face of censorship. It discusses the goals of privacy technologies, the adversary's goals in preventing communication, and the two-step process of finding the flow and preventing communication. Various censorship resistance systems like Tor and techniques such as mimicry, tunneling, and covert channels are explored. The lecture also delves into the challenges and solutions in decoy routing, including systems like Telex and attacks on decoy routing.