Taking control over the Tor network

Views: 6 toggle file list | toggle audio player

About: Taking control over the Tor network from 2012-01-04

This talk deals with weaknesses identified in the TOR network protocol and cryptography implementation. We manage to take control over users using this network and to access all your information and data exchanged despite cryptography.

Persons