Presented at
DEF CON 12 (2004),
July 30, 2004, 3 p.m.
(50 minutes).
What censorship resistance technique is right for me? (And should my Chinese dissident friends use the same one?)
Presenters:
-
Rachel Greenstadt
- Harvard University
Rachel Greenstadt is a researcher at Harvard University and a DHS fellow. She studies how information is leaked, collected, and controlled. She has done research on privacy, steganography, covert channels, and peer-to-peer security. Rachel is a contributor to the forthcoming book, The Economics of Information Security. She attends small, academic conferences compulsively, takes ballet classes, and reads science fiction in her spare time.
Similar Presentations: