Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the concept of anonymous communications through mix networks and Tor. It discusses the (n-1) attack, message expiry, heartbeat traffic, Loopix, onion routing, Tor's basic operation, stream tracing attacks, indirect load estimation, website fingerprinting, and the challenges faced by Tor. The instructor emphasizes the importance of privacy beyond content confidentiality, the vulnerability of metadata, and the need to consider various attacks when designing anonymity networks.