Anonymous Communication Martijn Terpstra & Max Tijssen - - PowerPoint PPT Presentation

anonymous communication
SMART_READER_LITE
LIVE PREVIEW

Anonymous Communication Martijn Terpstra & Max Tijssen - - PowerPoint PPT Presentation

Anonymous Communication Martijn Terpstra & Max Tijssen Introduction 1. Definition of anonymity 2. Reasons 3. Problems 4. Legal issues and implications 5. PETs 6. Crowds 7. I2P Definition of anonymity The state or quality


slide-1
SLIDE 1

Anonymous Communication

Martijn Terpstra & Max Tijssen

slide-2
SLIDE 2

Introduction

1. Definition of anonymity 2. Reasons 3. Problems 4. Legal issues and implications 5. PETs 6. Crowds 7. I2P

slide-3
SLIDE 3

Definition of anonymity

  • The state or quality of being anonymous

(Dictonary.com).

  • Level of anonymity
slide-4
SLIDE 4

Definition of anonymity

  • Anonymity vs pseudonymity
  • K - anonymity (Harvard)
  • Untraceability
  • Unlinkability
slide-5
SLIDE 5

Uses of AC

slide-6
SLIDE 6

Uses of AC

  • Privacy protection
  • Bypassing oppressive regimes
  • Whistleblowers (Wikileaks, Snowden)
slide-7
SLIDE 7

Uses of AC

  • Ability to discuss taboo subjects
  • Cybercrime (Silk Road)
slide-8
SLIDE 8

Issues with AC

  • Law enforcement
  • Legitimate aims of service providers
  • Lack of repercussions for the users
slide-9
SLIDE 9

Legal issues and implications

  • Certain rights have to be constrained in a

society

  • Untraceable and unreadable communication
  • Produces legal issues and solutions
slide-10
SLIDE 10

Art 8. Convention of Fundamental Rights of the European Union

Article 8 – Right to respect for private and family life

  • 1. Everyone has the right to respect for his private and family life, his home and his correspondence.
  • 2. There shall be no interference by a public authority with the exercise of this right except such as is in

accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.

slide-11
SLIDE 11

Whistleblower laws

  • Recommendation CM/Rec(2014)7 on the protection of whistleblowers
  • Council of europe. Not european union! Up to members how and if to

implement.

  • 12. The national framework should foster an environment that encourages reporting or disclosure in an open
  • manner. Individuals should feel safe to freely raise public interest concerns.
  • 18. Whistleblowers should be entitled to have the confidentiality of their identity maintained, subject to fair trial

guarantees.

slide-12
SLIDE 12

Implementation whistleblower legislation

  • Dutch (Adviespunt klokkenluiders)

○ Anonymous whistleblowing strongly discouraged. Information received from such a source has lower chance of being acted on.

  • UK

○ Not (or less likely) protected by Public Interest Disclosure Act

  • Portugal

○ Anonymity waived if a suspected person is charged.

slide-13
SLIDE 13

Data Retention Directive

Article 3 Obligation to retain data

  • 1. By way of derogation from Articles 5, 6 and 9 of Directive

2002/58/EC, Member States shall adopt measures to ensure that the data specified in Article 5 of this Directive are retained in accordance with the provisions thereof, to the extent that those data are generated or processed by providers of publicly available electronic communications services or of a public communica- tions network within their jurisdiction in the process of supply- ing the communications services concerned.

slide-14
SLIDE 14

Data Retention Directive

  • 1. Member States shall ensure that the following categories of

data are retained under this Directive: (a) data necessary to trace and identify the source of a

communication

(b) data necessary to identify the destination of a

communication

(f) data necessary to identify the location of mobile communi- cation equipment:

  • 2. No data revealing the content of the communication may be

retained pursuant to this Directive.

slide-15
SLIDE 15

Legislation changes

How to deal with anonymity?

  • French law (proposed but not enacted)

○ Force people to register with their true identity

  • US

○ U.S. Supreme Court Justice Scalia :“The very purpose of anonymity is to facilitate wrong by eliminating accountability”[Framkin 1995].

  • UK

○ Banning Tor is neither acceptable nor technically feasible

  • Sweden

○ Service providers only responsible if messages are clearly illegal.

slide-16
SLIDE 16

PETs

Server based Peer to Peer TOR GNUnet Crowds I2P ShadowWalker Freenet NetCamo

slide-17
SLIDE 17

Crowds

  • Users are grouped into crowds
  • Provides k-anonymity
slide-18
SLIDE 18

Crowds

  • A user is represented as a Jondo
  • Jondos contact a server called a Blender
  • Once a Blender has formed a crowd of

random users, the Blender informs the Jondo's of the crowd they are in

slide-19
SLIDE 19

Crowds

  • A Jondo will then send his request to a

random user in the crowd (possibly himself)

  • Any Jondo receiving a request will randomly

either send it to yet another Jondo or send it to its destination

  • Encryption of messages between Jondos

with a key shared by only those two Jondos

slide-20
SLIDE 20
slide-21
SLIDE 21

Crowds

  • The endpoint does not know the origin of a

request

  • Malicious users could do a denial of service

attack

slide-22
SLIDE 22

I2P

  • Invisible Internet Project
  • Layered encryption
  • Garlic routing
slide-23
SLIDE 23

I2P

  • Mostly focused on hidden services
  • Both sender and receiver are anonymous
slide-24
SLIDE 24

I2P

  • Unidirectional

tunnels

  • Each node build an

inbound and

  • utbound tunnel
slide-25
SLIDE 25

Tunnels

  • All tunnels are unidirectional
  • Each party builds 2 tunnels, one inbound,
  • ne outbound
  • Tunnel creators may use any peers in the

network in any order (and even any number

  • f times) in a single tunnel
slide-26
SLIDE 26

I2P

slide-27
SLIDE 27

I2P

  • Communication through garlic messages
  • Multiple garlic cloves can be combined into a

single garlic message

  • Each garlic cloves comes with its own

delivery instructions

slide-28
SLIDE 28

Tunnel creation

  • List of peers is made based on speed and

capacity, updated regularly

  • Client picks top tier peers randomly for

tunnel creation

slide-29
SLIDE 29

Servers

  • Identified by cryptographic keys
  • No DNS
slide-30
SLIDE 30

NetDB

  • NetDb is distributed via the floodfill algorithm
  • Floodfill routers
  • RouterInfos
  • LeaseSets
slide-31
SLIDE 31

RouterInfo

  • The router's identity
  • The contact addresses
  • When this was published
  • A set of arbitrary text options
  • The signature of the above, generated by

the identity's DSA signing key

slide-32
SLIDE 32

LeaseSet

  • documenting a group of tunnel entry points

(leases) for a particular client destination.

  • The tunnel gateway router (by specifying its

identity)

  • The tunnel ID on that router to send

messages with (a 4 byte number)

  • When that tunnel will expire.
slide-33
SLIDE 33

I2P compared to tor

  • I2P is designed for hidden services
  • Unidirectional tunnels
  • No clear distinction between client and

server

  • Less popular (k-anonymity), not much

research compared to tor

slide-34
SLIDE 34

Conclusion

AC has many uses, both legitimate and illegitimate. Produces and helps with legal issues. Many different PETs, all with their own advantage and disadvantages.

slide-35
SLIDE 35

TOR refresher

  • Uses layered encryption to pass through several nodes before reaching destination
  • With enough nodes (3) between start and end no single node knows both the start and end.
slide-36
SLIDE 36

TOR refresher

  • Prevent man in the middle sniffing
  • Hides identity
  • Uses own protocol: use of tor is obvious to third party
  • End point vulnerability
  • (Perhaps explanation of current technical attacks)