<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://132.161.132.157/drupal6"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Computer Science - TOR</title>
 <link>http://132.161.132.157/drupal6/taxonomy/term/272/0</link>
 <description></description>
 <language>en</language>
<item>
 <title>CS Table, Friday, February 20: Onion routing</title>
 <link>http://132.161.132.157/drupal6/node/763</link>
 <description>&lt;p&gt;
This week in CS Table, we will consider a widely used technique for using Internet services anonymously: onion routing.  The leading free implementation of onion routing is Tor.  The Tor Project provides a variety of software packages incorporating or building on this technique, of which the best known is the Tor browser, a Firefox derivative that uses onion routing for interactions with Web servers.
&lt;/p&gt;

&lt;p&gt;
The readings are:
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Tor Project.  2015.  Tor: overview.
&lt;a href=&quot;https://www.torproject.org/about/overview.html.en&quot;&gt;&lt;tt&gt;https://www.torproject.org/about/overview.html.en&lt;/tt&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Reed, M. G., and Syverson, P. F.  1999.  Onion routing [abstract only].  Prepared for the 1999 Symposium on Advanced Information Processing and  Analysis.  &lt;a href=&quot;http://www.onion-router.net/Publications/AIPA-1999.pdf&quot;&gt;&lt;tt&gt;http://www.onion-router.net/Publications/AIPA-1999.pdf&lt;/tt&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Dingledine, R., Mathewson, N., and Syverson, P.  2004.  Tor: the second-generation onion router.  Proceedings of the 13th USENIX Security Symposium.  &lt;a href=&quot;http://www.onion-router.net/Publications/tor-design.pdf&quot;&gt;&lt;tt&gt;http://www.onion-router.net/Publications/tor-design.pdf&lt;/tt&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
Packets containing copies of these readings are available on the bench near Noyce 3821.
&lt;/p&gt;

&lt;p&gt;
There is also one optional reading (on-line only):
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Anderson, M.  2014.  81% of Tor users can be de-anonymized by analyzing router information, research indicates.  &lt;a href=&quot;http://thestack.com/chakravarty-tor-traffic-analysis-141114&quot;&gt;&lt;tt&gt;http://thestack.com/chakravarty-tor-traffic-analysis-141114&lt;/tt&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
&lt;i&gt;Computer Science Table is a weekly meeting of Grinnell College community members (students, faculty, staff, etc.) interested in discussing topics related to computing and computer science.  CS Table meets Fridays from 12:10 to 12:50 in the Day PDR (JRC 224A).  Contact Sam Rebelsky, &lt;tt&gt;rebelsky@grinnell.edu&lt;/tt&gt;, for the weekly reading.  Students on meal plans, faculty, and staff are expected to cover the cost of their meals.  Visitors to the College and students not on meal plans can charge their meals to the department.&lt;/i&gt;
&lt;/p&gt;
</description>
 <comments>http://132.161.132.157/drupal6/node/763#comments</comments>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/274">anonymity</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/41">CS Table</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/273">onion routing</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/573">routing</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/272">TOR</category>
 <pubDate>Wed, 18 Feb 2015 20:00:22 +0000</pubDate>
 <dc:creator>stone</dc:creator>
 <guid isPermaLink="false">763 at http://132.161.132.157/drupal6</guid>
</item>
<item>
 <title>CS Table/CSC 295: Onion Routing and Anonymity</title>
 <link>http://132.161.132.157/drupal6/node/511</link>
 <description>This Friday at CS Table/CSC 295, Max and Martin will be leading a discussion on onion routing and its applications to anonymity.  Several readings are suggested:

&lt;ul&gt;
&lt;li&gt;Clark Boyd, &lt;a href=&quot;http://news.discovery.com/tech/wikileaks-tech-challenges-top-secret-security.html&quot;&gt;WikiLeaks
tech challenges &#039;top secret&#039; security&lt;/a&gt;,&amp;nbsp; Discovery News,
July 27, 2010.&lt;/li&gt;
&lt;li&gt;Paul Marks, &lt;a href=&quot;http://www.newscientist.com/article/dn19230-how-wikileaks-became-a-whistleblowers-haven.html&quot;&gt;How
Wikileaks became a whistleblower&#039;s haven&lt;/a&gt;, New Scientist, July
2010.&lt;/li&gt;
&lt;li&gt;David Goldschlag, Michael Reed, and Paul Syverson.&amp;nbsp;&lt;a href=&quot;http://www.onion-router.net/Publications/CACM-1999.pdf&quot;&gt;Onion
Routing for Anonymous and Private Internet Connections&lt;/a&gt;,
Communications of the ACM,
vol. 42, num. 2, February 1999.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.torproject.org/overview.html.en&quot;&gt;Tor:
overview&lt;/a&gt;, &lt;a href=&quot;http://www.torproject.org/about/torusers.html.en&quot;&gt;Who
uses Tor?&lt;/a&gt; (torproject.com)&lt;/li&gt;
&lt;/ul&gt;

As usual, we&#039;ll be meeting at noon on Friday in JRC 224A.  Hope to see you there!</description>
 <comments>http://132.161.132.157/drupal6/node/511#comments</comments>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/274">anonymity</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/41">CS Table</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/210">Internet</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/277">IP tunneling</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/276">layering</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/273">onion routing</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/272">TOR</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/278">WikiLeaks</category>
 <pubDate>Thu, 11 Nov 2010 19:49:52 +0000</pubDate>
 <dc:creator>davisjan</dc:creator>
 <guid isPermaLink="false">511 at http://132.161.132.157/drupal6</guid>
</item>
</channel>
</rss>
