Transcriptions
Note: this content has been automatically generated.
00:00:02
almost everyone up to right now have a device connected to give us not just how private audio communications
00:00:12
we know it's very easy to eavesdrop on organisational networks such as e. p. f. l.'s
00:00:16
but also other organisations and companies and many entities conducive insiders outsiders and even my where
00:00:25
typically of course communications are encrypted but doesn't always suspicion
00:00:29
as you can see this example on the left you see patterns of the human voice doing this guy
00:00:34
cool and on the right you see the corresponding perfectly well encrypted between from the network which everybody can see
00:00:43
future correlation which is how to remove it is possible in
00:00:46
this example to cover english words and sentences from these encrypted communication
00:00:54
both techniques accord traffic analysis they enable to recover information but also to fingerprint and track users
00:01:00
and they also enable targeted attacks what is the see
00:01:04
you doing right now what is this doctor now discussed it
00:01:11
sources exist but they all have a common drawback which is to protect through they need to
00:01:15
route your traffic a few times over the internet naturally just introduces latency and makes them so
00:01:24
would be the social corporate fine it's a communication network tailored organisations and companies
00:01:31
it creates channels between the users and access point would probably protects against these traffic analysis attacks
00:01:38
but also we use and or construction call this nets in a new way to
00:01:42
avoid the drawback to just mention any in our case the traffic remain within the organisation
00:01:48
this allows us to achieve much lower latency and higher speed which is critical for the end use
00:01:54
companies is very brief presentation i want you to our website perfect but for more