Master's Thesis
Total Page:16
File Type:pdf, Size:1020Kb
Evaluation of Privacy Enhancing Technologies Master of Science Thesis in Networks and Distributed Systems Elpidoforos Arapantonis Chalmers University of Technology Department of Computer Science and Engineering G¨oteborg, Sweden 2014 The Author grants to Chalmers University of Technology and University of Gothen- burg the non-exclusive right to publish the Work electronically and in a non- commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agree- ment. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Evaluation of Privacy Enhancing Technologies Elpidoforos Arapantonis c Elpidoforos Arapantonis, January 2014. Examiner: Erland Jonsson Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering SE-412 96 G¨oteborg Sweden Telephone + 46 (0)31-772 1000 [Cover: The idea for the image was taken by the [1] and has been re-created in image processing software] Department of Computer Science and Engineering G¨oteborg, Sweden January 2014 Abstract Anonymity, Privacy and Privacy Enhincing Technologies (PET) are the terms which are going to be discussed during the course of this project. The breakdown of the formal terminology and the theory will help the readers to follow the anal- ysis of the existing implementations. The evaluation on the PETs will give some useful results that will be discussed in the conclusion. The primary goal of this project is the in depth study of existing PET imple- mentations. This will help not only to understand their main functionalities, but also to classify them in categories. A further elaboration on the classification mod- els will help the readers to understand the present and future needs, concerning the additional features that the PETs need to cover. To assess the effectiveness of an implementation, a series of tests will be con- ducted with the help of an existing web application as well as with a custom made test (fingerprinting). The web application will check the implementation's behav- ior by conducting tests in various potential vulnerable parts and the fingerprinting will test the user's uniqueness regarding to the traces, which are left behind. The results from the evaluation are going to be an essential guide for the users and will help them understand which implementation is suitable to their needs. Finally, the conclusion will give a broader point of view regarding the preser- vation of the user's anonymity. It is clear that there are anonymity systems which are not included in this project. This presents a good opportunity for a future research either in a wider perspective or by focusing on specific implementations. Acknowledgements I would like to express my deep regards to my supervisor Erland Jonsson for his patience and guidance throughout the course of this thesis. I would also like to thank my parents and my friends for their great support and their constant encouragement without which this assignement would not be possible. G¨oteborg 4/12/2013 Contents 1 Introduction2 1.1 Motivation on Privacy Enhancing Technologies............2 1.2 The Goal................................3 1.3 Definitions................................3 1.4 Background...............................4 1.4.1 Cryptography..........................5 1.4.2 Mix Nets............................ 12 1.4.3 Onion Routing......................... 12 2 Review of Existing Implementations 14 2.1 Anonymity and pseudonimity tools for emails............ 14 2.1.1 Type-0 remailers........................ 14 2.1.2 Type-I remailers........................ 15 2.1.3 Type-II remailers........................ 15 2.1.4 Type-III remailers....................... 15 2.2 Anonymity and pseudonimity systems................. 15 2.2.1 Anonymous Proxy Servers................... 16 2.2.2 Java Anonymous Proxy (JAP)................. 17 2.2.3 Tor................................ 19 2.2.4 Crowds............................. 25 2.2.5 Freenet.............................. 26 2.3 Encryption Tools............................ 27 2.3.1 TrueCrypt............................ 27 2.3.2 Pretty Good Privacy (PGP).................. 28 3 Taxonomy and Modeling 32 3.1 Historical Overview........................... 32 3.2 Existing Classification Models..................... 32 i CONTENTS 4 Evaluation of Privacy Enhancing Technologies 38 4.1 The safe-surf option........................... 39 4.2 Test in ip-check.info with default options in web browser...... 40 4.3 Test with the custom made test.................... 42 4.4 Test the Implementations....................... 43 5 Results of Evaluation 46 5.1 Safe-Surf Option in ip-check.info.................... 46 5.1.1 Low Anonymity Java/Flash activated vs. Java/Flash non activated............................. 46 5.1.2 Medium Anonymity Java/Flash activated vs. Java/Flash non activated............................ 47 5.1.3 Medium Anonymity Java/Flash activated vs. Java/Flash non activated............................ 47 5.2 Java Anonymous Proxy with Mozilla Firefox default user profile vs. JonDoFox user profile......................... 48 5.3 Tor.................................... 49 5.3.1 Mozilla Firefox in Tor bundle................. 49 5.3.2 Mozilla Firefox with default user profile............ 49 5.3.3 Mozilla Firefox with JonDoFox user Profile.......... 49 5.4 Java Anonymous Proxy vs. Tor.................... 49 5.5 Results from Custom Test in anonymity systems........... 49 5.6 Vulnerabilities in TrueCrypt and PGP................ 51 5.6.1 Brute Force Attack....................... 52 5.6.2 Side Channel Attack...................... 52 6 Conclusion 54 Bibliography 59 A Appendix 60 A.1 TheTest.html { Extract Java version................. 60 A.2 Thelog.php { Keep Log records.................... 61 A.3 Stringcomp.php { Compare the Logs and return the % of similarity 65 ii List of Abbreviations PET Privacy Enhancing Technologies PII Personally Identifiable Information IOI Items of Interest DES Data Encryption Standard AES Advanced Encryption Standard EFF Electronic Frontier Foundation NIST National Institute of Standards and Technology ECB Electronic Codebook Mode CBC Cipher Block Chaining CTR Counter mode RSA Rivest, Shamir, Adleman, a public-key cryptosystem ECC Elliptic Curve Cryptosystem MAC Message Authentication Code MITM Man in the Middle DH Diffie-Hellman OR Onion Router JAP Java Anonymous Proxy AN.ON Anonymitat Online TCP Transmission Control Protocol SOCKS Socket Secure, an Internet Protocol TC Tor Client PGP Pretty Good Privacy HTTP Hypertext Transfer Protocol HTML HyperText Markup Language NAT Network Address Translation CSS Cascading Style Sheets SSL Secure Sockets Layer TLS Transport Layer Security FTP File Transfer Protocol PHP Hypertext Preprocessor OS Operating System WDE Whole Disk Encryption iii 1 Introduction "The quieter you become, the more you can hear." -Ram Dass 1.1 Motivation on Privacy Enhancing Technolo- gies Nowadays the vast growth of Internet has resulted on putting at risk the personal privacy. It is difficult for new users to realize that their online activity might cause them to reveal their personal information. Security issues are dangerous for the users and as a countermeasure a set of tools and technologies/mechanisms can be used to help them protect their identity. The term PETs (Privacy Enhancing Technologies) is referring to these technologies and can be defined as: "Privacy-Enhancing Technologies is a system of ICT measures protecting in- formational privacy by eliminating or minimizing personal data leakage thereby preventing unnecessary or unwanted processing of personal data, without the loss of the functionality of the information system" [2]. During the design and the operation of modern computers systems, the need to protect the users' privacy is identified. Hence, the protection of personal informa- tion, i.e. Personally Identifiable Information (PII), must be cared for. More and more applications are using personal data to provide new experience to the user. The ease of use of these applications tends to create a false impression of trust to the user. At the same time new threats are coming up continuously and increase the major problem of privacy when the user exchanges information with an on- 2 CHAPTER 1. INTRODUCTION line environment. The comprehension of the main terminology such as anonymity, identity management and privacy will help to better understand the whole concept of the Privacy Enhancing Technologies. 1.2 The Goal The main aim for this master thesis is to research and document the available PET technologies according to recent studies. The results from the documentation- analysis will be evaluated with the help of a test environment. 1.3 Definitions This section will be a reference to the terminology, which is used in the report. This will make it easier for the reader to understand the basics of each topic before dive into more details. Privacy: an attempt to define privacy is knotty. One of the best definitions is by Louis Brandeis and Samuel Warren