Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
CryptoParty April 2013 - Tor
Search
Frederic Jacobs
April 19, 2013
Technology
0
130
CryptoParty April 2013 - Tor
Slides for a talk about Tor to be given at a CryptoParty. Keynote download link:
http://cl.ly/OQSS
Frederic Jacobs
April 19, 2013
Tweet
Share
More Decks by Frederic Jacobs
See All by Frederic Jacobs
Building Trust in Digital Identities
fredericjacobs
0
75
Messaging in Times of Surveillance
fredericjacobs
0
78
(Open Source) Software Supply Chain Security
fredericjacobs
0
4.4k
Secure messaging - Hack.lu 2015
fredericjacobs
0
110
Revisiting the Cypherpunk Manifesto.
fredericjacobs
0
400
Lattice Cryptography: the Jacobi reduction algorithm
fredericjacobs
0
390
Usable Cryptography
fredericjacobs
0
130
Axolotl, an asynchronous cryptographic protocol with perfect forward secrecy for long-lived sessions
fredericjacobs
0
510
RubyMotion - Geneva.rb
fredericjacobs
4
460
Other Decks in Technology
See All in Technology
わたしがEMとして入社した「最初の100日」の過ごし方 / EMConfJp2025
daiksy
14
5.3k
AWSアカウントのセキュリティ自動化、どこまで進める? 最適な設計と実践ポイント
yuobayashi
7
850
AWSを活用したIoTにおけるセキュリティ対策のご紹介
kwskyk
0
410
実は強い 非ViTな画像認識モデル
tattaka
3
1.3k
OCI Success Journey OCIの何が評価されてる?疑問に答える事例セミナー(2025年2月実施)
oracle4engineer
PRO
2
170
ディスプレイ広告(Yahoo!広告・LINE広告)におけるバックエンド開発
lycorptech_jp
PRO
0
480
役員・マネージャー・著者・エンジニアそれぞれの立場から見たAWS認定資格
nrinetcom
PRO
4
6.4k
Amazon Aurora のバージョンアップ手法について
smt7174
2
170
Ruby on Railsで持続可能な開発を行うために取り組んでいること
am1157154
3
160
生成AI×財務経理:PoCで挑むSlack AI Bot開発と現場巻き込みのリアル
pohdccoe
1
780
DeepSeekとは?何がいいの? - Databricksと学ぶDeepSeek! 〜これからのLLMに備えよ!〜
taka_aki
1
160
どちらかだけじゃもったいないかも? ECSとEKSを適材適所で併用するメリット、運用課題とそれらの対応について
tk3fftk
2
220
Featured
See All Featured
Designing for humans not robots
tammielis
250
25k
How GitHub (no longer) Works
holman
314
140k
StorybookのUI Testing Handbookを読んだ
zakiyama
28
5.5k
Let's Do A Bunch of Simple Stuff to Make Websites Faster
chriscoyier
507
140k
A Philosophy of Restraint
colly
203
16k
個人開発の失敗を避けるイケてる考え方 / tips for indie hackers
panda_program
100
18k
Bash Introduction
62gerente
611
210k
実際に使うSQLの書き方 徹底解説 / pgcon21j-tutorial
soudai
175
52k
We Have a Design System, Now What?
morganepeng
51
7.4k
Site-Speed That Sticks
csswizardry
4
410
Facilitating Awesome Meetings
lara
52
6.2k
Building a Scalable Design System with Sketch
lauravandoore
461
33k
Transcript
anonymized web browsing
What is anonymization?
Routing
The Standard Approach Alice Bob
The VPN Approach Alice Bob
The Tor Approach Alice Bob The Tor Network
How to use?
None
Vidalia
None
Onion Routing
Initialization : Exchange of session keys over TLS
Route Initialization E N C R Y P T I
O N Data Data AES(data, exit node session key) AES(data, relay2 session key) AES(data, relay 1 session key) Address Relay 2 Address Exit Node
None
None
None
None
Socks
What can you do?
Relays
Bridges
Limitations
Bonus: Hidden Services