On Fri, Jun 25, 2004 at 10:02:40AM +0200, Eugen Leitl wrote:
> ----- Forwarded message from "V. Alex Brennen" <[EMAIL PROTECTED]> -----
> 
> From: "V. Alex Brennen" <[EMAIL PROTECTED]>
> Date: Thu, 24 Jun 2004 09:24:56 -0400
> To: "Peer-to-peer development." <[EMAIL PROTECTED]>
> Subject: [p2p-hackers] The Fifth HOPE in NYC
> User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7) Gecko/20040616
> Reply-To: "Peer-to-peer development." <[EMAIL PROTECTED]>
> 
> At The Fifth HOPE a talk will be given on how to break
> anonymity networks. Some commonly used p2p code such as
> Tor and the remailers will be covered.
> 
> I cannot attend the conference.  Is anyone on the list going
> who could report back?  I'm interested to hear if anything
> other than what's already been widely published is covered
> in this talk.

Yes, I'm one of the 5H organizers.  We'll be audio & videotaping,
so eventually you'll be able to get the full story.  I'll try
to write something up afterwards, or email me directly.  From
the description, it's hard to tell whether this will be something
revealing, or just a review of the well-known.
  -- Greg

> I'm working on a p2p anonymity project.
> 
> 
> Thanks,
> 
>    - VAB
> 
> 
> The Fifth HOPE, NYC July 9-11th, 2004
> http://www.the-fifth-hope.org/
> How To Break Anonymity Networks
> Nick Mathewson
> 
> Today's anonymous communication software (such as Mixmaster, Mixminion, 
> Nymservers, JAP, Tor, Anonymizer, etc.) allows people to communicate 
> while concealing their identities from each other and from external 
> attackers. But no deployed system is strong enough to protect every 
> pattern of user behavior against a sufficiently resourceful adversary, 
> and many of them fall to far simpler attacks. In this talk, Nick will 
> discuss working attacks against today's anonymity networks, drawing from 
> past technical and social attacks on deployed networks and from recent 
> academic research in traffic analysis, stylometry, and mix-net design. 
> He will present defenses to these attacks when such defenses are known 
> to exist.
> 
> Saturday 2300
> Area "B"
> _______________________________________________
> p2p-hackers mailing list
> [EMAIL PROTECTED]
> http://zgp.org/mailman/listinfo/p2p-hackers
> _______________________________________________
> Here is a web page listing P2P Conferences:
> http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences
> 
> ----- End forwarded message -----
> -- 
> Eugen* Leitl <a href="http://leitl.org";>leitl</a>
> ______________________________________________________________
> ICBM: 48.07078, 11.61144            http://www.leitl.org
> 8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
> http://moleculardevices.org         http://nanomachines.net


Reply via email to