Security Research
This is my generic security reesearch
page. Those presentations are released under the
Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) unless
stated otherwise:
Tor Research
This is my Tor research
page. Those presentations are released under the
Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) unless
stated otherwise:
- 2010 DepSec, Mobile
Privacy: Tor on the iPhone and other unusual devices
- 2010 DEF CON 18, Mobile Privacy: Tor on
the iPhone and other unusual devices (whitepaper)
- 2010 athcon, Mobile Privacy: Tor on the iPhone and other
unusual devices
- 2010 e-privacy, Surviving Your
Phone: Protecting Mobile Communications With Tor (audio)
- 2010 BlackHat Europe, Surviving
Your Phone: Protecting Mobile Communications With Tor
- 2009 DeepSec, Breaking Tor sessions
with HTML5
- 2009 Smau eAcademy, Tor in the
Web2.0: the rocky road to privacy
- 2009 e-privacy, Tor in the Web2.0:
understanding and avoiding the new privacy pitfalls (audio)
- 2008 Smau eAcademy, Peeling the
Onion: attacchi alla rete Tor
- 2008 MOCA, Attacchi
a Tor: come funzionano, come difendersi
- 2008 MOCA, Tor: alla
scoperta dei router a cipolla
- 2008 e-privacy, How Tor
works: introduzione all'onion routing
- 2008 Infosecurity08, Tor:
attacchi al protocollo e tecniche di difesa
- 2007 Smau eAcademy, Tor - The Onion Router
- 2006 Linux Day Piacenza, Tor:
privacy e anonimato in rete