Links gathered 8-2-2011: Difference between revisions
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
both michelle and i recommend reading John McGrath's book "loving big brother": | both michelle and i recommend reading John McGrath's book "loving big brother": | ||
<iframe frameborder="0" scrolling="no" style="border:0px" src="http://books.google.com/books?id=l1zaPL5a2RwC&lpg=PP1&ots=vEWRic0GtW&dq=loving%20big%20brother&pg=PP1&output=embed" width=500 height=500></iframe> | [<iframe frameborder="0" scrolling="no" style="border:0px" src="http://books.google.com/books?id=l1zaPL5a2RwC&lpg=PP1&ots=vEWRic0GtW&dq=loving%20big%20brother&pg=PP1&output=embed" width=500 height=500></iframe>] |
Revision as of 15:55, 10 February 2011
here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks:
Anonymous Communication on the Internet [1]
you can find the slides of my talk here: [2]
both michelle and i recommend reading John McGrath's book "loving big brother":
[<iframe frameborder="0" scrolling="no" style="border:0px" src="http://books.google.com/books?id=l1zaPL5a2RwC&lpg=PP1&ots=vEWRic0GtW&dq=loving%20big%20brother&pg=PP1&output=embed" width=500 height=500></iframe>]