[讲座] Tor 与网络审查制度间的微妙关系

楼主: OpenFoundry (OpenFoundry)   2011-03-10 11:35:56
【讲 题】Tor and censorship: lessons learned / Tor 与网络审查制度间的微妙关系
【主讲人】Roger Dingledine
 Roger Dingledine is project leader for The Tor Project, a US non-profit
 working on anonymity research and development for such diverse organi-
 zations as the US Navy and the Electronic Frontier Foundation. In addition
 to all the hats he wears for Tor, Roger organizes academic conferences on
 anonymity, speaks at a wide variety of industry and hacker conferences, and
 also does tutorials on anonymity for national and foreign law enforcement.
 * 主要专长:scalable secure systems, anonymity and privacy, cryptography
       and unobservability, civil liberties and human rights, and free
       software advocacy.
 * 联络方式:arma AT freehaven.net
 * 个人网页:http://www.freehaven.net/~arma/cv.html
【时 间】2011-03-29 (Tue.) 14:00-16:00
【地 点】中央研究院 资讯科学研究所 106 室
【主办单位】中研院 自由软件铸造场 (OpenFoundry) http://www.openfoundry.org/
【议程简介】
 Tor is a free-software anonymizing network that helps people around the
 world use the Internet in safety. Tor's 1800 volunteer relays carry traffic
 for several hundred thousand users including ordinary citizens who want
 protection from identity theft and prying corporations, corporations who
 want to look at a competitor's website in private, and soldiers and aid
 workers in the Middle East who need to contact their home servers without
 fear of physical harm. Tor was originally designed as a civil liberties
 tool for people in the West. But if governments can block connections to
 the Tor network, who cares that it provides great anonymity? A few years
 ago we started adapting Tor to be more robust in countries like China. We
 streamlined its network communications to look more like ordinary SSL, and
 we introduced "bridge relays" that are harder for an attacker to find and
 block than Tor's public relays. In the aftermath of the Iranian elections
 in June 2009, and then the periodic blockings in China, we've learned a
 lot about how circumvention tools work in reality for activists in tough
 situations. I'll give an overview of the Tor architecture, and summarize
 the variety of people who use it and what security it provides. Then we'll
 focus on the use of tools like Tor in countries like Iran and China: why
 anonymity is important for circumvention, why transparency in design and
 operation is critical for trust, the role of popular media in helping

Links booklink

Contact Us: admin [ a t ] ucptt.com