• Specification of Tribler Anonymity
  • Tor-like onion routing and privacy protection
  • Creating a circuit
  • Packet Encryption
  • Trials and production-level code
  • Known weaknesses
  • ToDo list