Description: https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-roger_dingledine-tor.pdf
Many of you have probably tried Tor, and then stopped because you found it too slow. Now that Tor has several hundred thousand users, our original design decisions are showing their age. We need to figure out and deploy some major changes if we want the Tor network to scale up to the million-user mark.
Problem #1 is that Tor's congestion control does not work well. We need to come up with ways to let quiet streams like web browsing co-exist better with loud streams like bulk transfer. Problem #2 is that some Tor users simply put too much traffic onto the network relative to the amount they contribute, so we need to work on ways to limit the effects of those users and/or provide priority to the other users. Problem #3 is that the Tor network simply doesn't have enough capacity to handle all the users that want privacy on the Internet. We need to develop strategies for increasing the overall community of relays, and consider introducing incentives to make the network more self-sustaining.
In this talk I'll walk through these problems and more: why we think these are the right problems to solve, and how we're solving them.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 17 , defcon 17 , dc-17 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.