[p2p-hackers] The Fifth HOPE in NYC (fwd from vab@cryptnet.net)
----- Forwarded message from "V. Alex Brennen" <vab@cryptnet.net> -----
On Fri, Jun 25, 2004 at 10:02:40AM +0200, Eugen Leitl wrote:
----- Forwarded message from "V. Alex Brennen" <vab@cryptnet.net> -----
From: "V. Alex Brennen" <vab@cryptnet.net> Date: Thu, 24 Jun 2004 09:24:56 -0400 To: "Peer-to-peer development." <p2p-hackers@zgp.org> Subject: [p2p-hackers] The Fifth HOPE in NYC User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7) Gecko/20040616 Reply-To: "Peer-to-peer development." <p2p-hackers@zgp.org>
At The Fifth HOPE a talk will be given on how to break anonymity networks. Some commonly used p2p code such as Tor and the remailers will be covered.
I cannot attend the conference. Is anyone on the list going who could report back? I'm interested to hear if anything other than what's already been widely published is covered in this talk.
Yes, I'm one of the 5H organizers. We'll be audio & videotaping, so eventually you'll be able to get the full story. I'll try to write something up afterwards, or email me directly. From the description, it's hard to tell whether this will be something revealing, or just a review of the well-known. -- Greg
I'm working on a p2p anonymity project.
Thanks,
- VAB
The Fifth HOPE, NYC July 9-11th, 2004 http://www.the-fifth-hope.org/ How To Break Anonymity Networks Nick Mathewson
Today's anonymous communication software (such as Mixmaster, Mixminion, Nymservers, JAP, Tor, Anonymizer, etc.) allows people to communicate while concealing their identities from each other and from external attackers. But no deployed system is strong enough to protect every pattern of user behavior against a sufficiently resourceful adversary, and many of them fall to far simpler attacks. In this talk, Nick will discuss working attacks against today's anonymity networks, drawing from past technical and social attacks on deployed networks and from recent academic research in traffic analysis, stylometry, and mix-net design. He will present defenses to these attacks when such defenses are known to exist.
Saturday 2300 Area "B" _______________________________________________ p2p-hackers mailing list p2p-hackers@zgp.org http://zgp.org/mailman/listinfo/p2p-hackers _______________________________________________ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences
----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net
participants (2)
-
Eugen Leitl
-
Greg Newby