Blinder – MPC Based Scalable and Robust Anonymous Committed Broadcast
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Low-Cost Traffic Analysis Of
Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk Abstract Other systems, based on the idea of a mix, were de- veloped to carry low latency traffic. ISDN mixes [33] Tor is the second generation Onion Router, supporting propose a design that allows phone conversations to be the anonymous transport of TCP streams over the Inter- anonymised, and web-mixes [6] follow the same design pat- net. Its low latency makes it very suitable for common terns to anonymise web traffic. A service based on these tasks, such as web browsing, but insecure against traffic- ideas, the Java Anon Proxy (JAP)1 has been implemented analysis attacks by a global passive adversary. We present and is running at the University of Dresden. These ap- new traffic-analysis techniques that allow adversaries with proaches work in a synchronous fashion, which is not well only a partial view of the network to infer which nodes are adapted for the asynchronous nature of widely deployed being used to relay the anonymous streams and therefore TCP/IP networks [8]. greatly reduce the anonymity provided by Tor. Furthermore, The Onion Routing project has been working on stream- we show that otherwise unrelated streams can be linked level, low-latency, high-bandwidth anonymous communi- back to the same initiator. Our attack is feasible for the cations [35]. Their latest design and implementation, adversary anticipated by the Tor designers. Our theoreti- Tor [18], has many attractive features, including forward se- cal attacks are backed up by experiments performed on the curity and support for anonymous servers. -
Social Network Based Anonymous Communication in Tor Peng Zhou, Xiapu Luo, Ang Chen, and Rocky K
1 STor: Social Network based Anonymous Communication in Tor Peng Zhou, Xiapu Luo, Ang Chen, and Rocky K. C. Chang Department of Computing, The Hong Kong Polytechnic University, Hunghom, Hong Kong cspzhouroc,csxluo,csachen,csrchang @comp.polyu.edu.hk f g Abstract—Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust model to help anonymity networks circumvent malicious routers and obtain secure anonymity. In particular, we design an input independent fuzzy model to determine trust relationships between friends based on qualitative and quantitative social attributes, both of which can be readily obtained from existing social networks. Moreover, we design an algorithm for propagating trust over an anonymity network. We integrate these two elements in STor, a novel social network based Tor. We have implemented STor by modifying the Tor’s source code and conducted experiments on PlanetLab to evaluate the effectiveness of STor. Both simulation and PlanetLab experiment results have demonstrated that STor can achieve secure anonymity by establishing trust-based circuits in a distributed way. Although the design of STor is based on Tor network, the social network based trust model can be adopted by other anonymity networks. Index Terms—Social Network, Anonymous Communication, Tor, Fuzzy Model F 1 INTRODUCTION alone can be easily bypassed by an attacker. -
Privacy Enhancing Technologies for the Internet III: Ten Years Later
Privacy Enhancing Technologies for the Internet III: Ten Years Later Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo Waterloo, ON [email protected] 1 Introduction In 1997 with Wagner and Brewer, and again in 2002, we looked at the then-current state of privacy-enhancing technologies (PETs) for the Internet. [27, 26] Now, in 2007, we take a third look. Technologies to help users maintain their privacy online are as important today as ever before—if not more so. Identity theft is the fastest-growing crime in the US today [47] and it is all too easy for would-be identity thieves to harvest personal information from the online trails Internet users leave every day. Losses of large databases of personal information are an almost daily occurrence [2]; for example, retailers’ servers are penetrated [44], databases are traded between government and private companies [36] and laptops containing social security numbers are stolen [35]. In 1997, we discussed the dossier effect: all available information about a person gets cross-referenced, and the resulting dossier ends up being used for many purposes, lawful and not. This practice has expanded over the years; the companies that compile and sell these dossiers are known as data brokers. Choicepoint is a prime example—in 2005, this data broker sold dossiers on over 150,000 Americans to a group of criminals. [10] The PETs we discuss here give people a way to control how much of their personal information is revealed when they use the Internet. By controlling the spread of this information, they can limit the size of the data brokers’ dossiers about them. -
Anonymity in Networks I - Basics
Anonymity in Networks I - Basics Janosch Maier Supervisor: Heiko Niedermayer Proseminar Network Hacking und Abwehr WS2011 Chair for Network Architectures and Services Fakultät für Informatik, Technische Universität München Email: [email protected] ABSTRACT will just shut down the service. Therefore Alice's chances of This paper introduces important terms related to anonymity, catching those criminals decreases a lot. describes basic attacks on people's identity in networks and proposes defense mechanisms. Different use cases of networks need different approaches in anonymizing. Due to the need of real-time answers in some applications they have different requirements. Mixing and onion routing are concepts that try to create anonymity in Figure 1: Investigators vs. Computer Criminals networks. Various anonymizers use those techniques to pro- vide anonymity for the purpose of { amongst others { send- Also for people who have no special reason to stay anony- ing E-mails, web browsing and chatting. Some of those por- mous, there is technically no need to be identified by a com- grams are briefly depicted and compared, addressing prob- munication partner. Somebody browsing on public websites lems and possible security breaches. or sending emails has no necessity to reveal his identity. Keywords Chapter2 describes some important terms needed to under- Anonymity, Pseudonymity, Identity, Internet, Network, Pri- stand anonymity in networks. Chapter3 shows attacks on vacy, Security people's data. The next chapter4 focuses on defense mech- anisms to the stated attacks. It presents the mechanisms onion routing and mixing and compares those techniques. 1. INTRODUCTION Chapter5 takes a look at the problems that cannot be solved Sending and receiving data via a secure connection does not using these mechanisms. -
Anonymous Communication on the Internet
Proceedings of Informing Science & IT Education Conference (InSITE) 2014 Cite as: Grahn, K. J., Forss, T., & Pulkkis, G. (2014). Anonymous communication on the internet. Proceedings of In- forming Science & IT Education Conference (InSITE) 2014 (pp. 103-120). Retrieved from http://Proceedings.InformingScience.org/InSITE2014/InSITE14p103-120Grahn0483.pdf Anonymous Communication on the Internet Kaj J. Grahn, Thomas Forss, and Göran Pulkkis Arcada University of Applied Sciences, Helsinki, Finland [email protected] [email protected] [email protected] Abstract There are many kinds of systems developed for anonymous communication on the internet. We survey a number of systems and evaluate their security. Among these systems we compare func- tionalities like Onion Routing, anonymous VPN services, probabilistic anonymity, and determin- istic anonymity. Other types of anonymous communication such as messaging, peer-to-peer communication, web use, emailing, and use of other Internet applications are also presented. We follow up by presenting different types of attacks with the purpose of identifying anonymously communicating users. These attacks fall into the following categories: internal/external attacks, passive/active attacks, and static/adaptive attacks. We describe the following attacks as well as known protections against these attacks: predecessor attacks, intersection attacks, timing attacks, and Sybil attacks. Lastly we discuss design choices, operation, and security of the current TOR network – The 2G Onion Router. Access -
Analysis of Client Anonymity in the Tor Network
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by HSN Open Archive Analysis of Client Anonymity in the Tor Network Christian August Holm Hansen Master of Science in Communication Technology Submission date: June 2015 Supervisor: Stig Frode Mjølsnes, ITEM Co-supervisor: Otto Wittner, ITEM Rune Sydskjør, Uninett Norwegian University of Science and Technology Department of Telematics Title: Analysis of Client Anonymity in the Tor Network Student: Christian August Holm Hansen Problem description: The Tor network combines source routing with layers of encryption to achieve sender anonymity. The general goal of this assignment is to understand the technical strengths and weaknesses of the Tor network, and recommend the best practice for operating Tor nodes. The first task is to establish, configure and successfully run a Tor exit node in an acceptable and secure mode within the network domain of NTNU. The second task is to experiment with and verify a selection of practical attacks reported in the literature. For instance, Hopper, Vasserman and Chan-Tin [1] claim that packet latency through Tor will leak identifying information. Finally, propose an improved attack on Tor security mechanisms, and if time allows, substantiate this with experimental measurements. [1] N. Hopper, E. Y. Vasserman and E. Chan-Tin. “How much anonymity does network latency leak?” ACM Transactions on Information and System Security (TISSEC) 13.2 (2010) Responsible professor: Stig Frode Mjølsnes (ITEM) Co-supervisors: Otto Wittner (ITEM/Uninett) Rune Sydskjør (Uninett) Øystein Vik (NTNU) Abstract The Tor Network has emerged as the most popular service providing sender anonymity on the Internet. -
Tor: the Second-Generation Onion Router
Tor: The Second-Generation Onion Router Roger Dingledine Nick Mathewson Paul Syverson The Free Haven Project The Free Haven Project Naval Research Lab [email protected] [email protected] [email protected] Abstract compromise successive nodes in the circuit and force them We present Tor, a circuit-based low-latency anonymous com- to decrypt it. Rather than using a single multiply encrypted munication service. This second-generation Onion Routing data structure (an onion) to lay each circuit, Tor now uses an system addresses limitations in the original design by adding incremental or telescoping path-building design, where the perfect forward secrecy, congestion control, directory servers, initiator negotiates session keys with each successive hop in integrity checking, configurable exit policies, and a practi- the circuit. Once these keys are deleted, subsequently com- cal design for location-hidden services via rendezvous points. promised nodes cannot decrypt old traffic. As a side benefit, Tor works on the real-world Internet, requires no special priv- onion replay detection is no longer necessary, and the process ileges or kernel modifications, requires little synchronization of building circuits is more reliable, since the initiator knows or coordination between nodes, and provides a reasonable when a hop fails and can then try extending to a new node. tradeoff between anonymity, usability, and efficiency. We Separation of “protocol cleaning” from anonymity: briefly describe our experiences with an international network Onion Routing originally required a separate “application of more than 30 nodes. We close with a list of open problems proxy” for each supported application protocol—most of in anonymous communication. -
Exploiting Hidden Services to Setup Anonymous Communication Infrastructures
Exploiting hidden services to setup anonymous communication infrastructures 21 October 2006 Fabio Pietrosanti Luxembourg naif at s0ftpj.org My goals • Explain anonymity concept and different networks • Explain the potential of exploiting anonymous networks in a different way • Present the Laissez Faire Island Project and get interests and contributors • Discuss on how to support the growth of anonymous communication systems with an a-commerce market 2 What’s this talk not about? • Not go deeper in the technical details of anonymous protocols • Do not make any promotion of commercial tools 3 Me • Underground: member of the s0ftpj group, sikurezza.org italian mailing list, e-privacy and winston smith anonymous communities, and some advisories made for PIX firewalls • Work: CTO of a swiss privacy provider • Personally: love for anonymity research! 4 You • Who does personally require anonymity? • Who have ever used TOR? 5 Agenda • Anonymity • Anonymity use and abuse • Anonymous Networks • TOR - The Onion Router • Anonymous Backbone Concept • Laissez Faire Island Project • LFI MAIL: unconventional approach to anonymous email 6 Anonymity 7 What’s anonymity • Anonymity is a state of not being identifiable within a set of subjects • Big difference between anonymity and confidentiality: • Identity protection • Location protection • Deniability of actions (w.r.t. identity) 8 What to protect? The sender/receiver anonymity issues • Who you are • Whom you communicate with • Where you are located • Where the recipient/ server is located Most of anon nets protects only the sender! Good anonymity requires mutual protection 9 Anonymity require cooperation • No organization would be ever able to stay anonymous by itself. • You can only get confidentiality yourself. -
'Onion' Encryption and the KI
Cent. Eur. J. Comp. Sci. • 2(4) • 2012 • 412-425 DOI: 10.2478/s13537-012-0034-4 Central European Journal of Computer Science Introducing OGR – a new approach to anonymous IP datagram transmission based on the Chaumian ‘onion’ encryption and the KISS principle Research Article Marek Kozłowski∗ Warsaw University of Technology Faculty of Mathematics and Information Sciences, Pl. Politechniki 1, 00-661 Warsaw, Poland Received 31 October 2011; accepted 15 October 2012 Abstract: The goal of this paper is to introduce a technique, called ‘OGR’, that allows anonymous transmission of IP data- grams of any kind. During the last decade numerous anonymizing solutions implementing the Chaumian ‘onion’ encryption have been proposed. Many of them are dedicated to specific services: either anonymous mail delivery or anonymous storage sharing, while the other ones, referred as low-latency systems, work real-time and are able to anonymize any TCP streams (with preference to HTTP), but poorly deal with or even don’t support other trans- ports. ‘OGR’ is strongly inspired by the original Chaumian Mix-net model and aims at universality (the ability to work at the level of IP datagrams rather than upper-layers protocols) and maximal simplicity (the KISS principle). It discards the idea of fixed circuits (or cascades) present in most low-latency solutions in favor of independent, intelligent packets. Although this approach may occur less efficient for huge data streams it’s able to handle any request-reply protocols including those operating over UDP as well as all applications where other transports or raw IP packets are to be used. -
Low-Latency Mix Networks for Anonymous Communication
Low-latency mix networks for anonymous communication Ania M. Piotrowska A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy of University College London. Department of Computer Science University College London 2020 2 3 I, Ania M. Piotrowska, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the work. To George Abstract Every modern online application relies on the network layer to transfer information, which exposes the metadata associated with digital communication. These distinc- tive characteristics encapsulate equally meaningful information as the content of the communication itself and allow eavesdroppers to uniquely identify users and their activities. Hence, by exposing the IP addresses and by analyzing patterns of the network traffic, a malicious entity can deanonymize most online communications. While content confidentiality has made significant progress over the years, existing solutions for anonymous communication which protect the network metadata still have severe limitations, including centralization, limited security, poor scalability, and high-latency. As the importance of online privacy increases, the need to build low-latency communication systems with strong security guarantees becomes nec- essary. Therefore, in this thesis, we address the problem of building multi-purpose anonymous networks that protect communication privacy. To this end, we design a novel mix network Loopix, which guarantees commu- nication unlinkability and supports applications with various latency and bandwidth constraints. Loopix offers better security properties than any existing solution for anonymous communications while at the same time being scalable and low-latency.