Anonymity
Jiayi Fu
Anonymity Jiayi Fu What is Anonymity - Describe the situation in - - PowerPoint PPT Presentation
Anonymity Jiayi Fu What is Anonymity - Describe the situation in which someone's name is not given or known - Anonymity != Privacy != Security - Anonymity: they can see what you do, but not who you are - Privacy: they can see
Jiayi Fu
anonymity
Normal Request
8000 1.2.3.4 Data req 9.8.7.6 80 1.2.3.4 9.8.7.6
Roger Dingledine, Nick Mathewson, Paul Syverson
shell, instant messaging
edges detect the congestion
confirmation attacks
All OR (Onion Routers) runs as normal user process with no special privileges.
User runs local software Onion Proxy 1. Fetch directories 2. Establish circuit across the Network 3. Handles connections from user application Accepts TCP streams and Multiplex them across the circuit OR1 OR2 1. Long term identity key a. Sign TLS certificate b. OR descriptor c. Sign direcroties 2. Short term Onion key a. Decrypt request from user for specific circuit
the payload
sendme and drop.
CKTID CMD DATA
2 1 509
CKTID RELAY STREAM ID DIGEST LEN CMD DATA
2 2 6 2 1 1 498
OR1 OR2 OR3 OR4 OR5
Onion Router
Leaky pipe circuit topology, OP can exit from different OR in the same circuit,
network
IP IP IP
accept user
to user RP
set of ORs as Introduction points(IP)
authentication to hidden service if needed
RP
will connect
entire network
greater chances of correlation
traffic
targeted websites.
circuits.
Steven J. Murdoch, George Danezis
level of protection provided by a collection of simple proxy servers, or ever below
The higher the load, the higher the latency
seconds) bursts of data
case should be higher than the second one.