Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring

Sometimes, hiding the existence of a communication is as important as hiding the contents of that communication. While simple network tunneling such as Tor or a VPN can keep the contents of communications confidential, under active network monitoring or restrictive IDS such tunnels are red flags which can subject the user to extreme scrutiny.

Provided by: Topic: Security Date Added: Aug 2014 Format: Webcast

Find By Topic