Lecture

Anonymous Communications: Mix Networks and Tor

Description

This lecture covers the concept of anonymous communications through mix networks and Tor. It discusses the (n-1) attack, message expiry, heartbeat traffic, Loopix, onion routing, Tor's basic operation, stream tracing attacks, indirect load estimation, website fingerprinting, and the challenges faced by Tor. The instructor emphasizes the importance of privacy beyond content confidentiality, the vulnerability of metadata, and the need to consider various attacks when designing anonymity networks.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.