![]() |
Deanonymizing the Dark Web – Challenges and New Techniques Online webinar: Dr. Matthew Lucas – TeleStrategies ISS World |
|
Deanonymizing the Dark Web – Challenges and New Techniques Technologies such as TOR and I2P, which power the dark web, have long been used by criminals for a range of illicit activities, from drug trafficking to child abuse. If done right, dark web sites can be operated anonymously, with little fear of detection. TOR has been improved in recent years to make deanonymization of hidden service operators and users very hard: Sybill attacks, code execution exploits, passive site fingerprinting and guard fingerprinting techniques have all become much less effective with the newest TOR versions. But there is hope for law enforcement! In this Webinar you will learn:
Presented by: All Contents Copyright © 2023
|