Low Latency Anonymizing Networks Bof presented at ShmooCon 2005

by Roger Dingledine (The TOR Project),

Tags: Security Anonymity

URL : http://web.archive.org/web/20050404000611/www.shmoocon.org/program.html

Summary : Come talk with Roger Dingledine, Tor project leader, about all the hard issues in the anonymity world. How to get users? How to get servers? How does public perception figure into security? Should we have a GUI, and how should it work? Should we capture IP packets or work at the TCP layer? What good uses are there for anonymizing networks, and do they outweigh the bad uses? How do we scale while handling heterogeneous and unreliable nodes, and without sacrificing security? Should we integrate with BT, Kazaa, Freenet? How to choose a good path length? Caching content at the exit nodes? Should we allow revocation of anonymity if a threshold of servers want to? When does fixing your entry or exit node help you? Padding and traffic shaping? Patents? Responder anonymity and survivable services? Censorship-resistant publishing? Corporate and government users? Local adversaries, ISP adversaries, government adversaries? Jurisdictions? China? Iran?