- 2010 DepSec, Mobile Privacy: Tor on the iPhone and other unusual devices
- 2010 DEF CON 18, Mobile Privacy: Tor on the iPhone and other unusual devices (whitepaper, demo)
- 2010 athcon, Mobile Privacy: Tor on the iPhone and other unusual devices (whitepaper)
- 2010 e-privacy, Surviving Your Phone: Protecting Mobile Communications With Tor (audio)
- 2010 BlackHat Europe, Surviving Your Phone: Protecting Mobile Communications With Tor (whitepaper)
- 2009 DeepSec, Breaking Tor sessions with HTML5
- 2009 Smau eAcademy, Tor in the Web2.0: the rocky road to privacy
- 2009 e-privacy, Tor in the Web2.0: understanding and avoiding the new privacy pitfalls (audio)
- 2008 Smau eAcademy, Peeling the Onion: attacchi alla rete Tor
- 2008 MOCA, Attacchi a Tor: come funzionano, come difendersi
- 2008 MOCA, Tor: alla scoperta dei router a cipolla
- 2008 e-privacy, How Tor works: introduzione all'onion routing
- 2008 Infosecurity08, Tor: attacchi al protocollo e tecniche di difesa
- 2007 Smau eAcademy, Tor - The Onion Router
- 2006 Linux Day Piacenza, Tor: privacy e anonimato in rete
ppt.cc/fVjECx ppt.cc/fEnHsx ppt.cc/fRZTnx ppt.cc/fSZ3cx ppt.cc/fLOuCx ppt.cc/fE9Nux ppt.cc/fL5Kyx ppt.cc/fIr1ax ppt.cc/f71Yqx tecmint.com linuxcool.com linux.die.net linux.it.net.cn ostechnix.com unix.com ubuntugeek.com runoob.com man.linuxde.net v.gd/4A2G5b v.gd/VBg0IE v.gd/kVkm7n v.gd/jCKP1G linuxprobe.com linuxtechi.com howtoforge.com linuxstory.org systutorials.com ghacks.net linuxopsys.com v.gd/2P9wTx v.gd/FtfpqE v.gd/eMfHsm v.gd/Ub7mqv v.gd/RReVk0 v.gd/vS3uTI v.gd/4Zxmba v.gd/1BnFph
Total Pageviews
Saturday, 26 November 2011
Tor Research
This is my Tor research page. Those presentations are released under the Creative Commons Attribution-Share Alike 3.0 Unported unless stated otherwise:
Labels:
翻墙术
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment