You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When privacy is not built in by default, it opens opportunities for participants in the network to passively gather data points of what is happening in the network. The type of information disclosed by the correlation of these data points and its severity depends on the context (i.e. network protocol).
What type of data and metadata can be gathered by passively listening to network traffic in different P2P networks?
What information (intelligence) can be gathered from there?
Is it possible to classify classes of problems/privacy vulnerabilities by comparing the different P2P networks?
How to feed this information back to building privacy preserving P2P networks?
The text was updated successfully, but these errors were encountered:
gpestana
changed the title
P2P network sniffing project
P2P network traffic analyser project
Dec 13, 2018
When privacy is not built in by default, it opens opportunities for participants in the network to passively gather data points of what is happening in the network. The type of information disclosed by the correlation of these data points and its severity depends on the context (i.e. network protocol).
What type of data and metadata can be gathered by passively listening to network traffic in different P2P networks?
What information (intelligence) can be gathered from there?
Is it possible to classify classes of problems/privacy vulnerabilities by comparing the different P2P networks?
How to feed this information back to building privacy preserving P2P networks?
The text was updated successfully, but these errors were encountered: