As privacy is becoming more and more of a concern even outside of the shady regions of international arms trading, contraband smuggling and selling relatives on the Internet, even your ordinary man/woman/diverse is turning to virtual private networks and other means for obfuscating personal communications. The Onion Router Project (or Tor for short) plays a central role in this context. Essentially implementing an overlay network on top of the Internet, it not only allows journalists working under less-than comforting regimes (for wont of a better expression) and political oppositions in similar contexts to but rather anybody who uses it communicate freely and without any censorship. As there are quite a few myths and misconceptions surrounding this project, this episode will dispel them all :-) apart from giving an overview of the technical and non-technical side of the implementation. If you're concerned with the your privacy and happen to use the Internet (and who isn't these days), then this definitely an episode you shouldn't miss.
- Tor: https://www.torproject.org
Public Money Public Code Campaign: https://fsfe.org/activities/publiccode/index.en.htmlTor Browser Bundle: https://www.torproject.org/downloadTor architecture: https://thesecmaster.com/detailed-anatomy-of-the-tor-network-structure-of-the-tor-networkTor SOCKS Proxy: https://github.com/PeterDaveHello/tor-socks-proxyTor source code: https://github.com/torproject/torTheoretical attack vectors: https://www.whonix.org/wiki/Speculative_Tor_AttacksNode control attack: https://www.researchgate.net/publication/260353732_A_New_Cell-Counting-Based_Attack_Against_TorHow to set up a bridge: https://tb-manual.torproject.org/bridgesSAS Rogue Heroes: https://en.wikipedia.org/wiki/SAS:_Rogue_HeroesUp First: https://www.npr.org/podcasts/510318/up-first