Exploiting Hidden Services to Setup Anonymous Communication Infrastructures
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Low-Cost Traffic Analysis Of
Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk Abstract Other systems, based on the idea of a mix, were de- veloped to carry low latency traffic. ISDN mixes [33] Tor is the second generation Onion Router, supporting propose a design that allows phone conversations to be the anonymous transport of TCP streams over the Inter- anonymised, and web-mixes [6] follow the same design pat- net. Its low latency makes it very suitable for common terns to anonymise web traffic. A service based on these tasks, such as web browsing, but insecure against traffic- ideas, the Java Anon Proxy (JAP)1 has been implemented analysis attacks by a global passive adversary. We present and is running at the University of Dresden. These ap- new traffic-analysis techniques that allow adversaries with proaches work in a synchronous fashion, which is not well only a partial view of the network to infer which nodes are adapted for the asynchronous nature of widely deployed being used to relay the anonymous streams and therefore TCP/IP networks [8]. greatly reduce the anonymity provided by Tor. Furthermore, The Onion Routing project has been working on stream- we show that otherwise unrelated streams can be linked level, low-latency, high-bandwidth anonymous communi- back to the same initiator. Our attack is feasible for the cations [35]. Their latest design and implementation, adversary anticipated by the Tor designers. Our theoreti- Tor [18], has many attractive features, including forward se- cal attacks are backed up by experiments performed on the curity and support for anonymous servers. -
Fundamentos Da Ciências Da Computação.Indd
Ernane Rosa Martins (Organizador) Fundamentos da Ciência da Computação 2 Atena Editora 2019 2019 by Atena Editora Copyright © Atena Editora Copyright do Texto © 2019 Os Autores Copyright da Edição © 2019 Atena Editora Editora Executiva: Profª Drª Antonella Carvalho de Oliveira Diagramação: Lorena Prestes Edição de Arte: Lorena Prestes Revisão: Os Autores O conteúdo dos artigos e seus dados em sua forma, correção e confiabilidade são de responsabilidade exclusiva dos autores. Permitido o download da obra e o compartilhamento desde que sejam atribuídos créditos aos autores, mas sem a possibilidade de alterá-la de nenhuma forma ou utilizá-la para fins comerciais. Conselho Editorial Ciências Humanas e Sociais Aplicadas Prof. Dr. Álvaro Augusto de Borba Barreto – Universidade Federal de Pelotas Prof. Dr. Antonio Carlos Frasson – Universidade Tecnológica Federal do Paraná Prof. Dr. Antonio Isidro-Filho – Universidade de Brasília Prof. Dr. Constantino Ribeiro de Oliveira Junior – Universidade Estadual de Ponta Grossa Profª Drª Cristina Gaio – Universidade de Lisboa Prof. Dr. Deyvison de Lima Oliveira – Universidade Federal de Rondônia Prof. Dr. Gilmei Fleck – Universidade Estadual do Oeste do Paraná Profª Drª Ivone Goulart Lopes – Istituto Internazionele delle Figlie de Maria Ausiliatrice Prof. Dr. Julio Candido de Meirelles Junior – Universidade Federal Fluminense Profª Drª Lina Maria Gonçalves – Universidade Federal do Tocantins Profª Drª Natiéli Piovesan – Instituto Federal do Rio Grande do Norte Profª Drª Paola Andressa Scortegagna – Universidade Estadual de Ponta Grossa Prof. Dr. Urandi João Rodrigues Junior – Universidade Federal do Oeste do Pará Profª Drª Vanessa Bordin Viera – Universidade Federal de Campina Grande Prof. Dr. Willian Douglas Guilherme – Universidade Federal do Tocantins Ciências Agrárias e Multidisciplinar Prof. -
N.K. Jemisin in the City We Became, the Award-Winning Science Fiction Writer Keeps Breaking New Ground P
Featuring 407 Industry-First Reviews of Fiction, Nonfiction, Children'sand YA books KIRKUSVOL. LXXXVIII, NO. 6 | 15 MARCH 2020 REVIEWS N.K. Jemisin In The City We Became, the award-winning science fiction writer keeps breaking new ground p. 14 Also in the issue: Kevin Nguyen, Victoria James, Jessica Kim, and more from the editor’s desk: Great Escapes Through Reading Chairman BY TOM BEER HERBERT SIMON President & Publisher MARC WINKELMAN John Paraskevas # March is the dreariest month. We know that spring is around the cor- Chief Executive Officer ner, but…it can be a long time coming. If you’re fortunate, you might escape MEG LABORDE KUEHN [email protected] to a Florida beach or some other far-flung destination for rejuvenation. For Editor-in-Chief the rest of us, spring break may come in the form of a book that transports TOM BEER [email protected] us elsewhere, indelibly rendered through prose. Here are five titles, new or Vice President of Marketing coming soon, that the travel agent in me would like to recommend. But be SARAH KALINA [email protected] forewarned: There is frequently trouble in paradise. Managing/Nonfiction Editor ERIC LIEBETRAU Saint X by Alexis Schaitkin (Celadon Books, Feb. 18): The title refers [email protected] to the fictional Caribbean island where the Thomas family is on a vacation Fiction Editor LAURIE MUCHNICK at an evocatively described resort—“the long drive lined with perfectly ver- [email protected] Tom Beer tical palm trees,” “the beach where lounge chairs are arranged in a parab- Children’s Editor VICKY SMITH ola,” the scents of “frangipani and coconut sunscreen and the mild saline of [email protected] equatorial ocean.” Alas, this family vacation does not end well, forever altering the lives of Claire Young Adult Editor LAURA SIMEON Thomas, age 7 at the time, and Clive Richardson, an employee at the resort. -
Social Network Based Anonymous Communication in Tor Peng Zhou, Xiapu Luo, Ang Chen, and Rocky K
1 STor: Social Network based Anonymous Communication in Tor Peng Zhou, Xiapu Luo, Ang Chen, and Rocky K. C. Chang Department of Computing, The Hong Kong Polytechnic University, Hunghom, Hong Kong cspzhouroc,csxluo,csachen,csrchang @comp.polyu.edu.hk f g Abstract—Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust model to help anonymity networks circumvent malicious routers and obtain secure anonymity. In particular, we design an input independent fuzzy model to determine trust relationships between friends based on qualitative and quantitative social attributes, both of which can be readily obtained from existing social networks. Moreover, we design an algorithm for propagating trust over an anonymity network. We integrate these two elements in STor, a novel social network based Tor. We have implemented STor by modifying the Tor’s source code and conducted experiments on PlanetLab to evaluate the effectiveness of STor. Both simulation and PlanetLab experiment results have demonstrated that STor can achieve secure anonymity by establishing trust-based circuits in a distributed way. Although the design of STor is based on Tor network, the social network based trust model can be adopted by other anonymity networks. Index Terms—Social Network, Anonymous Communication, Tor, Fuzzy Model F 1 INTRODUCTION alone can be easily bypassed by an attacker. -
Blinder – MPC Based Scalable and Robust Anonymous Committed Broadcast
Blinder – MPC Based Scalable and Robust Anonymous Committed Broadcast Ittai Abraham1, Benny Pinkas1,2, and Avishay Yanai*1 1VMware Research, Israel 2Bar-Ilan University, Israel July 23, 2020 Abstract Anonymous Committed Broadcast is a functionality that extends DC-nets and allows a set of clients to privately commit a message to set of servers, which can then simultaneously open all committed messages in a random ordering. Anonymity holds since no one can learn the ordering or the content of the client’s committed message. We present Blinder, the first system that provides a scalable and fully robust solution for anonymous committed broadcast. Blinder maintains both properties of security (anonymity) and robustness (aka. ‘guaranteed output delivery’ or ‘availability’) in the face of a global active (malicious) adversary. Moreover, Blinder is censorship resistant, meaning that a honest client cannot be blocked from participating. Blinder obtains its security and scalability by carefully combining classical and state-of-the-art techniques from the fields of anonymous communication and secure multiparty computation (MPC). Relying on MPC for such a system is beneficial since it naturally allows the parties (servers) to enforce some properties on accepted messages prior their publication. In order to demonstrate scalability, we evaluate Blinder with up to 1 million clients, up to 100 servers and a message size of up to 10 kilobytes. In addition, we show that it is a perfect fit to be implemented on a GPU. A GPU based implementation of Blinder with 5 servers, which accepts 1 million clients, incurs a latency of less than 8 minutes; faster by a factor of > 100 than the 3-servers Riposte protocol (SOSP ’15), which is not robust and not censorship resistant; we get an even larger factor when comparing to AsynchroMix and PowerMix (CCS ’19), which are the only constructions that guarantee fairness (or robustness in the online phase). -
Privacy Enhancing Technologies for the Internet III: Ten Years Later
Privacy Enhancing Technologies for the Internet III: Ten Years Later Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo Waterloo, ON [email protected] 1 Introduction In 1997 with Wagner and Brewer, and again in 2002, we looked at the then-current state of privacy-enhancing technologies (PETs) for the Internet. [27, 26] Now, in 2007, we take a third look. Technologies to help users maintain their privacy online are as important today as ever before—if not more so. Identity theft is the fastest-growing crime in the US today [47] and it is all too easy for would-be identity thieves to harvest personal information from the online trails Internet users leave every day. Losses of large databases of personal information are an almost daily occurrence [2]; for example, retailers’ servers are penetrated [44], databases are traded between government and private companies [36] and laptops containing social security numbers are stolen [35]. In 1997, we discussed the dossier effect: all available information about a person gets cross-referenced, and the resulting dossier ends up being used for many purposes, lawful and not. This practice has expanded over the years; the companies that compile and sell these dossiers are known as data brokers. Choicepoint is a prime example—in 2005, this data broker sold dossiers on over 150,000 Americans to a group of criminals. [10] The PETs we discuss here give people a way to control how much of their personal information is revealed when they use the Internet. By controlling the spread of this information, they can limit the size of the data brokers’ dossiers about them. -
RW-1970-10-31.Pdf
Dedi-rated To Serving The Needs Of The Musi- & Record Industry October 31, 1910 15c In the opinion of the editors, this week the following records are the WHO SLVG11t /'/('KS OF THE 11 "/: /: K VAN IN THE MORRISON WORLD Ringo Starr's C&W warb- Neil Diamond has never "Domino" (V a n Jan/WB, According to Clarence Car- lings will not go unnoticed been hotter. His waxing of ASCAP) is a fantastically ter "It's All in Your Mind" in either the country or "He Ain't Heavy . He's intense hit offering from (Fame, BMI) which, come pop fields as he laments My Brother" (Harrison, incredible Van Morrison. to think of it, is probably "Beaucoups of Blues" ASCAP), t h e Hollies' h i t He just keeps coming up true. "Patches" follow-up (Window, BMI). Same guy should keep him just that with amazing songs time is certainly more than a sang "Act Naturally" and way (Uni 55264). after time (Warner Bros. sure bet (Atantic 2774). "Honey Don't" (Apple 7434). 2969). .S'LF'F:/'ER /'/('K.S' OF THE 1I'FFK Betty Everett's debut for "Ah Feel She Really "Back Home" (Dayglow/ There's nothing strange the label has got what it Doesn't Wanna Do It" (Dou- Popdraw, ASCAP) is Hol- about "Right On" (Doraflo- takes to take off both R & ble Diamond, BMI) claims land for the group called Greyhound, BMI) by the B and pop. She sounds bet- Grover Mitchell. He does it Golden Earring. That's Strange Bros. Show. The ter than ever singing "I with lots of drive and grit where this one has been former Strangeloves (with Got to Tell Somebody" to give this one a head number one for over six a little help from their (Wally Raker, BMI) (Fan- start to success (Vanguard weeks and they could do friends) create a great tasy 652). -
Tesis Doctoral, Universidad De Extremadura, 2012, P
Alfonso Vázquez Atochero INCIDENCIA DE LA BRECHA DIGITAL EN GRUPOSDE IGUALES A PARTIR DE LA INTERACTIVIDAD ENTRE LA IDENTIDAD FíSICA Y LA IDENTIDAD DIGITAL A l f o n s o V á z q u e z A t o c h e r o INCIDENCIA DE LA BRECHA DIGITAL EN GRUPOSDE IGUALES A PARTIR DE LA INTERACTIVIDAD ENTRE LA IDENTIDAD FíSICA Y LA IDENTIDAD DIGITAL A l f o n s o V á z q u e z A t o c h e r o INCIDENCIA DE LA BRECHA DIGITAL EN GRUPOSDE IGUALES A PARTIR DE LA INTERACTIVIDAD ENTRE LA IDENTIDAD FíSICA Y LA IDENTIDAD DIGITAL EGALITE (EUROPEAN SCIENTIFIC INSTITUTE, Publishing) Impressum Bibliographic information published by the National and University Library "St. Kliment Ohridski" in Skopje; detailed bibliographic data are available in the internet at http://www.nubsk.edu.mk/; CIP - 316.47:004.7 COBISS.MK-ID 94334986 Any brand names and product names mentioned in this book are subject to trademark, brand or patent protection and trademarks or registered trademarks of their respective holders. The use of brand names, product names, common names, trade names, product descriptions etc. even without a particular marking in this works is in no way to be construed to mean that such names may be regarded as unrestricted in respect of trademark and brand protection legislation and could thus be used by anyone. Publisher: European Scientific Institute Street: "203", number "1", 2300 Kocani, Republic of Macedonia Email: [email protected] Printed in Republic of Macedonia ISBN: 978-608-4642-08-4 Copyright © 2013 by the author, European Scientific Institute and licensors All rights reserved. -
PORTADA ELECTRONICA 660 NOV.Indd
Seguridad en redes Análisis en torno a las tecnologías de privacidad en redes. Anonimato en transmisión de datos Por el Dr. Javier Areitio Prof. Dr. Javier Areitio En el presente artículo se analizan diversas tecnologías de privacidad para redes. Es un hecho conocido que la inter- Bertolín – E.Mail: ceptación de sesiones de comunicación usuales proporciona una gran cantidad de datos privados de tráfico incluso [email protected] aunque se encuentre cifrada. Actualmente se observa un elevado crecimiento de aplicaciones del anonimato de las Catedrático de la comunicaciones electrónicas en ámbitos como los negocios, nivel corporativo, personal además de su uso tradicional Facultad de Ingeniería. a nivel gubernamental. Tecnologías de seguridad clásicas en entornos de negocio como VPN (Virtual Private Network) ESIDE. tanto basadas en SSL (sin cliente) como con cliente basada en IPSec no proporcionan privacidad ya que son suscepti- Director del Grupo de bles de ataques a la identidad y a la localización. Hoy en día existen muchos negocios que esperan construirse sobre Investigación Redes y redes de anonimato. Se observa un incremento de proveedores de servicios de anonimato gratuitos y de pago para Sistemas. hosting de Email y de servidores físicos y virtuales, servicios de proxy inverso Internet, proveedores de pagos (tarjetas Universidad de Deusto. visa prepago), etc. Introducción La privacidad es fundamental a la hora de poder protegerse contra todo tipo de usuarios maliciosos y activi- dades fraudulentas, en entornos de colaboración e interacción confiable. La privacidad es necesaria para prote- ger los siguientes elementos: (i) A la fuente de la información. (ii) Al destino de la información. -
Doulgeraki2010.Pdf
Τεχνολογικό Εκπαιδευτικό Ίδρυμα Κρήτης Σχολή Τεχνολογικών Εφαρμογών Τμήμα Εφαρμοσμένης Πληροφορικής & Πολυμέσων Πτυχιακή εργασία ΑΝΩΝΥΜΙΑ ΚΑΙ ΕΦΑΡΜΟΓΕΣ ΣΤΟ ΙΝΤΕΡΝΕΤ Δουλγεράκη Καλλιόπη (AM: 1382) E-mail: [email protected] Κάππα Βιργινία (ΑΜ: 1389) E-mail: [email protected] Ηράκλειο – 27/1/2010 Επόπτης Καθηγητής: Δρ. Μανιφάβας Χαράλαμπος Ανωνυμία και εφαρμογές στο Internet Υπεύθυνη Δήλωση: Βεβαιώνουμε ότι είμαστε συγγραφείς αυτής της πτυχιακής εργασίας και ότι κάθε βοήθεια την οποία είχαμε για την προετοιμασία της, είναι πλήρως αναγνωρισμένη και αναφέρεται στην πτυχιακή εργασία. Επίσης έχουμε αναφέρει τις όποιες πηγές από τις οποίες κάναμε χρήση δεδομένων, ιδεών ή λέξεων, είτε αυτές αναφέρονται ακριβώς είτε παραφρασμένες. Επίσης βεβαιώνουμε ότι αυτή η πτυχιακή εργασία προετοιμάστηκε από εμάς προσωπικά ειδικά για τις απαιτήσεις του προγράμματος σπουδών του Τμήματος Εφαρμοσμένης Πληροφορικής και Πολυμέσων του Τ.Ε.Ι. Κρήτης. ii Καλλιόπη Δουλγεράκη – Βιργινία Κάππα Ευχαριστίες Θα θέλαμε να ευχαριστήσουμε τον εισηγητή καθηγητή Δρ. Μανιφάβα Χαράλαμπο , ο οποίος μας επόπτευε στην πτυχιακή εργασία μας, τις οικογένειές μας για τη συμπαράστασή τους, και έναν καλό μας φίλο και συνάδελφο, τον Δανιηλίδη Ιωάννη για την πολύτιμη βοήθειά του. iii Ανωνυμία και εφαρμογές στο Internet Πίνακας Περιεχομένων Ευχαριστίες..................................................................................................................iii Πίνακας Εικόνων .......................................................................................................vii -
Anonymity in Networks I - Basics
Anonymity in Networks I - Basics Janosch Maier Supervisor: Heiko Niedermayer Proseminar Network Hacking und Abwehr WS2011 Chair for Network Architectures and Services Fakultät für Informatik, Technische Universität München Email: [email protected] ABSTRACT will just shut down the service. Therefore Alice's chances of This paper introduces important terms related to anonymity, catching those criminals decreases a lot. describes basic attacks on people's identity in networks and proposes defense mechanisms. Different use cases of networks need different approaches in anonymizing. Due to the need of real-time answers in some applications they have different requirements. Mixing and onion routing are concepts that try to create anonymity in Figure 1: Investigators vs. Computer Criminals networks. Various anonymizers use those techniques to pro- vide anonymity for the purpose of { amongst others { send- Also for people who have no special reason to stay anony- ing E-mails, web browsing and chatting. Some of those por- mous, there is technically no need to be identified by a com- grams are briefly depicted and compared, addressing prob- munication partner. Somebody browsing on public websites lems and possible security breaches. or sending emails has no necessity to reveal his identity. Keywords Chapter2 describes some important terms needed to under- Anonymity, Pseudonymity, Identity, Internet, Network, Pri- stand anonymity in networks. Chapter3 shows attacks on vacy, Security people's data. The next chapter4 focuses on defense mech- anisms to the stated attacks. It presents the mechanisms onion routing and mixing and compares those techniques. 1. INTRODUCTION Chapter5 takes a look at the problems that cannot be solved Sending and receiving data via a secure connection does not using these mechanisms. -
Gangs of Nicaragua”
1 José Luis Rocha / Dennis Rodgers 2 José Luis Rocha / Dennis Rodgers José Luis Rocha, Dennis Rodgers “Gangs of Nicaragua” 1st Edition -- Managua, 2008 185 pp ISBN: © José Luis Rocha, Dennis Rodgers Cover photograph and photograph on page 69: Anneli Tolvanen All other photographs: José Luis Rocha Graphic design: Jamileth Treminio Printing: Impresiones Helios The texts collected in this volume were previously published in Envío, the Journal of the Central American University (UCA), Managua, Nicaragua. Tel: (505) 278-2557. Fax: (505) 278-1402. Email: [email protected]. Website: www.envio.org.ni A Spanish version of this book was previously published as Bróderes Descobijados y Vagos Alucinados: Una Década con las Pandillas Nicaragüenses 1997-2007, with the financial support of Norwegian Church Aid (NCA). This electronic English translation is published with the financial support of the Brooks World Poverty Institute (BWPI), University of Manchester, UK. 3 “When I was younger, my parents would beat me, to prevent me from becoming a gang member. But the issue is not whether or not they beat me, and it’s not a question of education either. These can be important, but not always. The issue is how you connect to the ‘feeling’ of being a gang member. You get led to the gang because of friendship, and you become a gang member to be with your brothers”. César, 17 years old, 1999 “I feel good in the gang. I don’t get backstabbed because I know who my brothers are.” Teresa, 20 years old, 1999 “I opened myself up to the gang little by little.