Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Security and anonymity vulnerabilities in Tor

URL
http://ftp.ccc.de/congress/25c3/audio_only/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp3
File name
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp3
File size
28.4 MB
MD5
1f806f321499601cc0ec17449bb9e72f
SHA1
f50f153d25de5b7b3285c4b17206ccb29ac06c82

There have been a number of exciting bugs and design flaws in Tor over the years, with effects ranging from complete anonymity compromise to remote code execution. Some of them are our fault, and some are the fault of components (libraries, browsers, operating systems) that we trusted. Further, the academic research community has been coming up with increasingly esoteric – and increasingly effective! – attacks against all anonymity designs, including Tor.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !