Talk
Intermediate

TOR: The digital anonymity of a person

Approved

This talk presents a technical , research-oriented examination of the tor network from privacy engineering and traffic analysis perspective . Rather than focusing on advocacy or an overview the session explores how TOR functions at the protocol and network level , including circuit construction , relay roles , timings behavior and metadata exposure .

The discussion covers realistic threat models , lawful and ethical constraints and the distinction between academic traffic analysis and illegal deanonymization attempts . Emphasis is placed on understanding failure modes , observable patterns , and design trade offs inherent in anonymity systems

  • A clear, protocol-level understanding of how the Tor network operates, including circuits, relay roles, and traffic flow.

  • Insight into what anonymity systems protect effectively and where metadata leakage and timing patterns still occur.

  • Practical awareness of realistic threat models and the difference between theoretical, academic, and adversarial analyses.

  • An understanding of lawful and ethical boundaries in privacy and traffic analysis research.

  • A methodology for evaluating privacy preserving systems using open-source tools and transparent research practices.

  • Improved ability to reason about privacy engineering trade-offs rather than relying on assumptions or myth

Tutorial about using a FOSS project
Story of a FOSS project - from inception to growth
Introducing a FOSS project or a new version of a popular project

0 %
Approvability
0
Approvals
0
Rejections
0
Not Sure
No reviews yet.