Version Tomorrow is the first day of the rest of your life

lecture: Tor & Configuration Management

Event large

This presentation will explain in detail how the tor network can grow with a minimum of effort. It will also zoom in on the problem of centralisation and how we can evade it and still make the network grow even larger. I'll try to explain to you how you can do this with configuration management. Even the smallest of organisations can use this way to expand the network and to allow us to browse the internet more securely.

#NetworkSecurity

The world today shows us that there is an increased need for more secure networks than the internet. Many adversaries are trying to tie into your communications on the internet and try to intercept every bit of data you are sending over the undersea's cables and around the world. The tor network is strong but it's not as strong as it can be. This presentation will explain in detail how the tor network can grow with a minimum of effort. It will also zoom in on the problem of centralisation and how we can evade it and still make the network grow even larger. I'll try to explain to you how you can do this with configuration management. Even the smallest of organisations can use this way to expand the network and to allow us to browse the internet more securely.

Some of the advantages:


  • Diversity

  • Wider audience of system administrators

  • Easier management of your tor relays/bridges/hidden services

  • Smaller step to your first tor relay

  • Less overhead during installation

Some of the concerns:


  • Too easy to get in control of a hive of relays

  • Three letter agencies can deploy an entire cluster in an instant

  • Centralisation (Too much centralisation can be an indication for a SPOF)

  • ...