Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring

Provided by:
Topic: Security
Format: Webcast
Sometimes, hiding the existence of a communication is as important as hiding the contents of that communication. While simple network tunneling such as Tor or a VPN can keep the contents of communications confidential, under active network monitoring or restrictive IDS such tunnels are red flags which can subject the user to extreme scrutiny.

Find By Topic