BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.riat.at//AEQPXC
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-39c3-AEQPXC@pretalx.riat.at
DTSTART;TZID=CET:20251229T173000
DTEND;TZID=CET:20251229T180000
DESCRIPTION:When building privacy-sensitive applications\, we often rely on
  proxies like Tor to ensure that no direct connections escape the intended
  anonymity network. However\, verifying that every part of an application 
 reliably goes through the proxy is surprisingly difficult. Even a single s
 yscall escaping the proxy path can quietly deanonymize a user.\n\nSocksTra
 ce is a lightweight proxy-leak detection tool that traces network-related 
 syscalls and validates whether they correctly route through the configured
  proxy.\n\nIn this talk\, I’ll show how SocksTrace works under the hood\
 , what kinds of leaks it can catch\, and why syscall-level inspection is e
 ssential for high-assurance privacy tools. I’ll also walk through real-w
 orld findings: during our testing\, we identified previously unknown proxy
  leaks in major browsers including Firefox and Brave\, one of which result
 ed in a confirmed bug bounty. These results highlight how subtle proxy rou
 ting mistakes can occur even in widely-used\, privacy-oriented software.
DTSTAMP:20260314T084927Z
LOCATION:CDC Triangle
SUMMARY:SocksTrace: Preventing Proxy Leaks in Your Applications - Robert Mi
 ndo
URL:https://pretalx.riat.at/39c3/talk/AEQPXC/
END:VEVENT
END:VCALENDAR
