<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.hope.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Williamjones</id>
	<title>HOPE Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.hope.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Williamjones"/>
	<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php/Special:Contributions/Williamjones"/>
	<updated>2026-05-12T18:32:09Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.3</generator>
	<entry>
		<id>https://wiki.hope.net/index.php?title=The_Polyjuice_Potion_-netflow_correlation_avoidance_Workshop&amp;diff=1609</id>
		<title>The Polyjuice Potion -netflow correlation avoidance Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=The_Polyjuice_Potion_-netflow_correlation_avoidance_Workshop&amp;diff=1609"/>
		<updated>2022-07-22T21:41:10Z</updated>

		<summary type="html">&lt;p&gt;Williamjones: /* What Participants Should Bring to the Workshop (if anything) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= The Polyjuice Potion: a workshop on netflow correlation avoidance workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 6:00pm - 7:00pm, Workshop C (D&#039;Angelo 307)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop C (D&#039;Angelo 307).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
This workshop covers modern netflow correlation and web traffic fingerprinting attacks and countermeasures in practice, with a focus on Tor, i2p, nym, and other publicly accessible anonymity tools. Most of the academic literature focuses on how to perform these types of attacks only in theory. In practice they are difficult to set up and require extensive collaboration between backbone-positioned adversaries. One would hope that these adversaries are careful, accountable, well-resourced, and not beholden to the interests of private corporations. I&#039;ll first describe the state of the art for these attacks, including: netflow correlation, web traffic fingerprinting, active traffic disruption, and throttling. I&#039;ll then detail an end-to-end pipeline for legally spinning up a C2 server with full non-attribution, enabled using publicly available infrastructure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
William Jones&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
If you want to bring a laptop to check out some of the tools in the links, please do.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Software ==&lt;br /&gt;
This talk is on the theory of how to generate adversarial traces on low bandwidth networks (i.e. tor)&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
Bring your thinking caps&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
any links go here&lt;/div&gt;</summary>
		<author><name>Williamjones</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=The_Polyjuice_Potion_-netflow_correlation_avoidance_Workshop&amp;diff=1608</id>
		<title>The Polyjuice Potion -netflow correlation avoidance Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=The_Polyjuice_Potion_-netflow_correlation_avoidance_Workshop&amp;diff=1608"/>
		<updated>2022-07-22T21:40:50Z</updated>

		<summary type="html">&lt;p&gt;Williamjones: /* Required Software */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= The Polyjuice Potion: a workshop on netflow correlation avoidance workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 6:00pm - 7:00pm, Workshop C (D&#039;Angelo 307)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop C (D&#039;Angelo 307).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
This workshop covers modern netflow correlation and web traffic fingerprinting attacks and countermeasures in practice, with a focus on Tor, i2p, nym, and other publicly accessible anonymity tools. Most of the academic literature focuses on how to perform these types of attacks only in theory. In practice they are difficult to set up and require extensive collaboration between backbone-positioned adversaries. One would hope that these adversaries are careful, accountable, well-resourced, and not beholden to the interests of private corporations. I&#039;ll first describe the state of the art for these attacks, including: netflow correlation, web traffic fingerprinting, active traffic disruption, and throttling. I&#039;ll then detail an end-to-end pipeline for legally spinning up a C2 server with full non-attribution, enabled using publicly available infrastructure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
William Jones&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
If you want to bring a laptop to check out some of the tools in the links, please do.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Software ==&lt;br /&gt;
This talk is on the theory of how to generate adversarial traces on low bandwidth networks (i.e. tor)&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
any optional or required stuff to bring go here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
any links go here&lt;/div&gt;</summary>
		<author><name>Williamjones</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=The_Polyjuice_Potion_-netflow_correlation_avoidance_Workshop&amp;diff=1607</id>
		<title>The Polyjuice Potion -netflow correlation avoidance Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=The_Polyjuice_Potion_-netflow_correlation_avoidance_Workshop&amp;diff=1607"/>
		<updated>2022-07-22T21:39:53Z</updated>

		<summary type="html">&lt;p&gt;Williamjones: /* Full Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= The Polyjuice Potion: a workshop on netflow correlation avoidance workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 6:00pm - 7:00pm, Workshop C (D&#039;Angelo 307)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop C (D&#039;Angelo 307).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
This workshop covers modern netflow correlation and web traffic fingerprinting attacks and countermeasures in practice, with a focus on Tor, i2p, nym, and other publicly accessible anonymity tools. Most of the academic literature focuses on how to perform these types of attacks only in theory. In practice they are difficult to set up and require extensive collaboration between backbone-positioned adversaries. One would hope that these adversaries are careful, accountable, well-resourced, and not beholden to the interests of private corporations. I&#039;ll first describe the state of the art for these attacks, including: netflow correlation, web traffic fingerprinting, active traffic disruption, and throttling. I&#039;ll then detail an end-to-end pipeline for legally spinning up a C2 server with full non-attribution, enabled using publicly available infrastructure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
William Jones&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
If you want to bring a laptop to check out some of the tools in the links, please do.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Software ==&lt;br /&gt;
any required software goes here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
any optional or required stuff to bring go here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
any links go here&lt;/div&gt;</summary>
		<author><name>Williamjones</name></author>
	</entry>
</feed>