Low Latency Anonymizing Networks

Presented at ShmooCon I (2005), Feb. 5, 2005, 10 a.m. (60 minutes).

Come talk with Roger Dingledine, Tor project leader, about all the hard issues in the anonymity world. How to get users? How to get servers? How does public perception figure into security? Should we have a GUI, and how should it work? Should we capture IP packets or work at the TCP layer? What good uses are there for anonymizing networks, and do they outweigh the bad uses? How do we scale while handling heterogeneous and unreliable nodes, and without sacrificing security? Should we integrate with BT, Kazaa, Freenet? How to choose a good path length? Caching content at the exit nodes? Should we allow revocation of anonymity if a threshold of servers want to? When does fixing your entry or exit node help you? Padding and traffic shaping? Patents? Responder anonymity and survivable services? Censorship-resistant publishing? Corporate and government users? Local adversaries, ISP adversaries, government adversaries? Jurisdictions? China? Iran?


Presenters:

  • Roger Dingledine - Project Leader, Tor
    Roger Dingledine is a security and privacy researcher. While at MIT he developed Free Haven, one of the early peer-to-peer systems that emphasized resource management while retaining anonymity for its users. He consults for the US Navy to design and develop systems for anonymity and traffic analysis resistance. Recent work includes anonymous publishing and communication systems, traffic analysis resistance, censorship resistance, attack resistance for decentralized networks, and reputation.

Links:

Similar Presentations: