{"guid":"7fcad042-c9e4-5713-8991-938d7e33f050","title":"Three Ways to Enhance Metadata Protection Beyond Tor - secushare.org","subtitle":null,"slug":"34c3-ChaosWest-1-three_ways_to_enhance_metadata_protection_beyond_tor_secushare_org","link":"https://c3voc.de","description":"First way: Cover traffic from file sharing, DHT and eventually multicast; Secondly, framing of application data, thirdly, mixnets for high-latency applications. http://secushare.cheettyiapsyciew.onion/anonymity","original_language":"eng","persons":["lynX"],"tags":["34c3-chaoswest","1"],"view_count":429,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2018-03-18T01:00:00.000+01:00","updated_at":"2026-03-24T08:00:04.900+01:00","length":1132,"duration":1132,"thumb_url":"https://static.media.ccc.de/media/congress/34c3-chaoswest/1-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/34c3-chaoswest/1-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/34c3-chaoswest/7fcad042-c9e4-5713-8991-938d7e33f050-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/34c3-chaoswest/7fcad042-c9e4-5713-8991-938d7e33f050-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-ChaosWest-1-three_ways_to_enhance_metadata_protection_beyond_tor_secushare_org","url":"https://api.media.ccc.de/public/events/7fcad042-c9e4-5713-8991-938d7e33f050","conference_title":"ChaosWest @ 34c3","conference_url":"https://api.media.ccc.de/public/conferences/34C3-chaoswest","related":[{"event_id":2809,"event_guid":"0417a69e-87af-43f9-abbb-0f0666bfda3e","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":7},{"event_id":5068,"event_guid":"1c3ff3c0-00f3-5d3b-b141-c8db54bf0b26","weight":1},{"event_id":5069,"event_guid":"84639ed6-fb5d-584a-a879-84e60b0cafd5","weight":31},{"event_id":5070,"event_guid":"a87a0521-6b12-5dca-851a-c32a13cc4581","weight":25},{"event_id":5073,"event_guid":"74d7736f-f73a-5164-9e7d-2fc69e74cc99","weight":9},{"event_id":5074,"event_guid":"a6054988-4570-5b14-8a61-ef934f21c10e","weight":14},{"event_id":5075,"event_guid":"759bcf8b-b8d8-5087-9c02-0c2faa0ab8b4","weight":15},{"event_id":5076,"event_guid":"bb239a0d-bf40-5e30-bc9b-aa060640eeab","weight":8},{"event_id":5080,"event_guid":"ed6c2ab5-68a0-552e-94d3-63a3cc028cd0","weight":6},{"event_id":5081,"event_guid":"b41404a3-3f9b-55b3-8dee-e086fdd4f66d","weight":5},{"event_id":5083,"event_guid":"e340f48d-a241-5296-aea5-821917671506","weight":9},{"event_id":5085,"event_guid":"f64deec6-e13f-54e8-8afa-22cdcf9d8f81","weight":7},{"event_id":5088,"event_guid":"7a9b5382-8a68-5969-8891-045996c9870a","weight":7},{"event_id":5091,"event_guid":"98a509e4-80e4-5d72-94db-8220358225bc","weight":8},{"event_id":6089,"event_guid":"165016fb-55bf-4512-a240-ddee32a9436a","weight":5},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":8}],"recordings":[{"size":53,"length":1132,"mime_type":"video/mp4","language":"eng","filename":"34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1280,"height":720,"updated_at":"2018-03-18T15:01:38.788+01:00","recording_url":"https://cdn.media.ccc.de/congress/34c3-chaoswest/h264-hd/34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_hd.mp4","url":"https://api.media.ccc.de/public/recordings/23265","event_url":"https://api.media.ccc.de/public/events/7fcad042-c9e4-5713-8991-938d7e33f050","conference_url":"https://api.media.ccc.de/public/conferences/34C3-chaoswest"},{"size":33,"length":1132,"mime_type":"video/mp4","language":"eng","filename":"34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-03-18T19:04:34.600+01:00","recording_url":"https://cdn.media.ccc.de/congress/34c3-chaoswest/h264-sd/34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_sd.mp4","url":"https://api.media.ccc.de/public/recordings/23289","event_url":"https://api.media.ccc.de/public/events/7fcad042-c9e4-5713-8991-938d7e33f050","conference_url":"https://api.media.ccc.de/public/conferences/34C3-chaoswest"},{"size":12,"length":1132,"mime_type":"audio/opus","language":"eng","filename":"34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2018-03-18T19:05:05.830+01:00","recording_url":"https://cdn.media.ccc.de/congress/34c3-chaoswest/opus/34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_opus.opus","url":"https://api.media.ccc.de/public/recordings/23290","event_url":"https://api.media.ccc.de/public/events/7fcad042-c9e4-5713-8991-938d7e33f050","conference_url":"https://api.media.ccc.de/public/conferences/34C3-chaoswest"},{"size":17,"length":1132,"mime_type":"audio/mpeg","language":"eng","filename":"34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2018-03-18T19:06:03.652+01:00","recording_url":"https://cdn.media.ccc.de/congress/34c3-chaoswest/mp3/34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/23291","event_url":"https://api.media.ccc.de/public/events/7fcad042-c9e4-5713-8991-938d7e33f050","conference_url":"https://api.media.ccc.de/public/conferences/34C3-chaoswest"},{"size":97,"length":1132,"mime_type":"video/webm","language":"eng","filename":"34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1280,"height":720,"updated_at":"2018-03-18T19:06:36.455+01:00","recording_url":"https://cdn.media.ccc.de/congress/34c3-chaoswest/webm-hd/34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/23292","event_url":"https://api.media.ccc.de/public/events/7fcad042-c9e4-5713-8991-938d7e33f050","conference_url":"https://api.media.ccc.de/public/conferences/34C3-chaoswest"},{"size":62,"length":1132,"mime_type":"video/webm","language":"eng","filename":"34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-03-18T19:17:06.838+01:00","recording_url":"https://cdn.media.ccc.de/congress/34c3-chaoswest/webm-sd/34c3-chaoswest-1-eng-Three_Ways_to_Enhance_Metadata_Protection_Beyond_Tor_-_secushareorg_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/23304","event_url":"https://api.media.ccc.de/public/events/7fcad042-c9e4-5713-8991-938d7e33f050","conference_url":"https://api.media.ccc.de/public/conferences/34C3-chaoswest"}]}