Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Introduction
00:00 • 6min
Is There a Transport Layer for These Different Messages?
05:36 • 2min
Aderman v One
07:38 • 2min
Is There a Difference Between IP Addresses?
09:50 • 4min
The Cibil Attack Is a Problem in a Bit.
13:23 • 3min
The Eclipse Attack
16:27 • 2min
Is There a Difference Between Inbound and Outbound Connections?
18:34 • 3min
How to Test Address Relay?
21:32 • 3min
A Known Technique in Networking
24:44 • 5min
Is There a Way to Ensure the Longest Possible Time These Addresses Propagate?
29:47 • 2min
Using Time Stamps to Infer Topology
31:49 • 2min
Is There a Difference Between Public and Private Connections?
34:08 • 3min
The Finger Print Attacks Are a Whole Class of Attacks
36:48 • 3min
The Problem With Data Base Is Transient.
39:43 • 2min