// track 04
Anonymity Engineering
Threat models, traffic analysis, padding, mix networks, browser fingerprinting, OS / TCP fingerprints, steganographic channels.
7 of 7 modules published
- 4.1
Threat models for network anonymity
Passive observers, active adversaries, global traffic correlation, and the vocabulary needed to reason about anonymity without hand-waving.
29 min read·intermediate - 4.2
Traffic analysis fundamentals
How timing, size, and burst structure leak information from encrypted traffic, from end-to-end correlation to website fingerprinting.
27 min read·advanced - 4.3
Padding strategies and cover traffic
Constant-rate padding, adaptive padding, dummy traffic, and why hiding packet shape is harder than appending zeros.
22 min read·advanced - 4.4
Mix networks: Loopix and Nym
From Chaumian mixes to Loopix and Nym: delay, cover traffic, Sphinx packets, and the anonymity-latency-bandwidth tradeoff.
23 min read·advanced - 4.5
Browser fingerprinting in depth
Canvas, WebGL, fonts, audio, viewport geometry, and why hiding your IP does not standardize your browser.
26 min read·advanced - 4.6
OS and TCP/IP stack fingerprinting
How TCP SYN fields, TLS ClientHello structure, and HTTP/2 settings betray client identity even when the payload is encrypted.
23 min read·advanced - 4.7
Steganographic channels
DNS, ICMP, HTTP, and media-based covert channels; storage versus timing channels; and why protocol normalization breaks many hiding schemes.
23 min read·advanced
// for teams and consultants
Need this curriculum for your team?
Custom training, downloadable companion assets, network-architecture review, and on-call deployment help land inside our consulting engagements →