• Intro
  • Threat model
  • Tunnel routing
  • Garlic routing
  • Network database[ ]
  • Peer selection
  • Cryptography
    • ElGamal / AES+SessionTag
  • Network comparisons