Links gathered 8-2-2011: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks: | * here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks: | ||
Anonymous Communication on the Internet: [http://www10.cs.rose-hulman.edu/Papers/Jones.pdf]. | |||
you can find the slides of my talk here: | * you can find the slides of my talk here: [http://pzwart3.wdka.hro.nl/mediawiki/images/0/0f/PietZwartTalkSedaGuerses08022011.pdf]. | ||
[http://pzwart3.wdka.hro.nl/mediawiki/images/0/0f/PietZwartTalkSedaGuerses08022011.pdf] | |||
both michelle and i recommend reading John McGrath's book "loving big brother" | * both michelle and i recommend reading John McGrath's book "loving big brother" [http://books.google.com/books?id=l1zaPL5a2RwC&lpg=PP1&ots=vEWRic0GtW&dq=loving%20big%20brother&pg=PP1&output=embed]. | ||
[http://books.google.com/books?id=l1zaPL5a2RwC&lpg=PP1&ots=vEWRic0GtW&dq=loving%20big%20brother&pg=PP1&output=embed] |
Revision as of 15:56, 10 February 2011
- here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks:
Anonymous Communication on the Internet: [1].
- you can find the slides of my talk here: [2].
- both michelle and i recommend reading John McGrath's book "loving big brother" [3].