Tor-related research positions at the University of Waterloo
If you know anyone who'd like to be a grad student or postdoc working on Tor (or related things), please pass this information along to them.
The Cryptography, Security, and Privacy (CrySP) research group at the University of Waterloo is seeking applications for graduate students and a postdoctoral researcher in the field of privacy-enhancing technologies, preferably on the topic of privacy-preserving communications systems. These positions will be held in the Cheriton School of Computer Science.
For the postdoctoral researcher position:
Applicants must hold a PhD in a related field, and should have a proven research record, as demonstrated by publications in top security and privacy venues (such as Oakland, CCS, USENIX Security, and NDSS) and/or top venues specific to privacy-enhancing technologies (such as PETS).
The start date of the position is negotiable, but Sep 2010 or Jan 2011 is preferred. The position may be for one or two years.
Applicants should submit a CV, a research plan, two or three selected papers, and the names and contact information of three references.
For further information about the position, or to apply, please send email to Ian Goldberg <iang@cs.uwaterloo.ca> with "Postdoctoral position" in the subject line. Applications may be considered as they arrive.
For the graduate student positions:
See http://crysp.uwaterloo.ca/prospective/ for information on the application process. We accept students for start dates in September, January, and May of each year. The application deadline for starting in Jan 2011 is May 31, 2010; the deadline for starting in May 2011 is Sep 30, 2010; the deadline for starting in Sep 2011 is Dec 15, 2010.
For more information about the CrySP group or the Cheriton School of Computer Science, see http://crysp.uwaterloo.ca/ and http://www.cs.uwaterloo.ca/ respectively.
Comments
Please note that the comment area below has been archived.
Hi!!!!!!!!!! Yeah!!, this
Hi!!!!!!!!!! Yeah!!, this is offtopic but security research related too!!!! I don't know if you've got my email i sent to the torproject yesterday, where i wrote about a serious but mostly funny flaw in the official Tor Browser Bundle for linux!!!!!!!!!!!!! yours!!!!!!!!!! yeah, i'm sure there is a flaw!!!!!!!!! I didn't got a reply from you yet, but i ain't very sure if my email has reached you because yesterday i had some strange and very severe errors from the webmail software!!!!!!!!! but it seems to me like now everything's working!!!!! ~bee!!!!!!!!!!!!!
Yes we received your email.
Yes we received your email. The person who builds the tbb's is trying to recreate your bug. In the future, https://bugs.torproject.org is a fine place to report bugs.
Hi phobos!!! Thank you very
Hi phobos!!! Thank you very much for the link, i just took one account at the bugs house!!!, and very good for the email!!!!! but just to know, were all the newlines removed from my email?!!! I sent another message to myself, and even the banner of the webmail was appended at the end of my text, on the same line!!!!!!! I didn't even read what i wrote after writing it!!!!!, even if this is improbable, maybe that was a bit a difficult mail to read!!! but in this case it wasnt because of a my fault!!!!!!!! Well, ok!!!!!! bye!!!! ~bee!!!!
... ... 这是?
... ...
这是?
It seems that GFW's
It seems that GFW's techniques of blocking bidges have been updated.
Several days ago, if a group of bridges(3 bridges) have been detected by GFW, they would probably be blocked and the tor users in China cannot even establish a tor circuit. However, today it seems that if a group of bridges(3 bridges) have been detected by GFW, the tor users in China can apparently connect to to the Tor network via the group of bridges which seem to be fade bridges that are generated by the GFW, and surely the users can not view any web page via tor network.
As far as our research
As far as our research finds, they are blocking by IP:Port combination, nothing more sophisticated.
Vidalia can not auto change
Vidalia can not auto change new "bridges" when tor be started . Is it too difficulty ?
How to auto change new
How to auto change new bridges ?
Tor relays/bridges are
Tor relays/bridges are totally blocked by the China Great Firewall?! I tried several times in the past weeks, each time with a few new bridges, but never got through at all. Is it possible that the GFW is now smart enough to tell TOR traffic by some kind of protocol exchange signatures? Any way to fight this?
Thanks,
Waterson
TOR IS REALLY MAKING HEADWAY
TOR IS REALLY MAKING HEADWAY IN NIGERIA.......... WE ARE REALLY ENJOYING TOR IN NIGERIA WITH VARIOUS ISP AND MOBILE INTERNET SUBSCRIBERS............ WE REALLY MAKE USE OF ON MTN NIGERIA.......... THANKS TO GOD ALMIGHTY AND GOD BLESS TOR DEVELOPERS.
THANKS,
BOLAJI SANUSI AKA PROF. GOGETTER
FESTAC, LAGOS NIGERIA.