Anonymity Engineering
Threat models, traffic analysis, padding, mix networks, browser fingerprinting, OS / TCP fingerprints, steganographic channels.
7 of 7 modules published
Threat models for network anonymity
Passive observers, active adversaries, global traffic correlation, and the vocabulary needed to reason about anonymity without hand-waving.
Traffic analysis fundamentals
How timing, size, and burst structure leak information from encrypted traffic, from end-to-end correlation to website fingerprinting.
Padding strategies and cover traffic
Constant-rate padding, adaptive padding, dummy traffic, and why hiding packet shape is harder than appending zeros.
Mix networks: Loopix and Nym
From Chaumian mixes to Loopix and Nym: delay, cover traffic, Sphinx packets, and the anonymity-latency-bandwidth tradeoff.
Browser fingerprinting in depth
Canvas, WebGL, fonts, audio, viewport geometry, and why hiding your IP does not standardize your browser.
OS and TCP/IP stack fingerprinting
How TCP SYN fields, TLS ClientHello structure, and HTTP/2 settings betray client identity even when the payload is encrypted.
Steganographic channels
DNS, ICMP, HTTP, and media-based covert channels; storage versus timing channels; and why protocol normalization breaks many hiding schemes.
Need this curriculum applied to your network?
Custom training, downloadable companion assets, network architecture review, and on-call deployment help land inside our consulting engagements.
See engagements