Anonymous Communication
Martijn Terpstra & Max Tijssen
Anonymous Communication Martijn Terpstra & Max Tijssen - - PowerPoint PPT Presentation
Anonymous Communication Martijn Terpstra & Max Tijssen Introduction 1. Definition of anonymity 2. Reasons 3. Problems 4. Legal issues and implications 5. PETs 6. Crowds 7. I2P Definition of anonymity The state or quality
Martijn Terpstra & Max Tijssen
1. Definition of anonymity 2. Reasons 3. Problems 4. Legal issues and implications 5. PETs 6. Crowds 7. I2P
(Dictonary.com).
society
Art 8. Convention of Fundamental Rights of the European Union
Article 8 – Right to respect for private and family life
accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.
implement.
guarantees.
Implementation whistleblower legislation
○ Anonymous whistleblowing strongly discouraged. Information received from such a source has lower chance of being acted on.
○ Not (or less likely) protected by Public Interest Disclosure Act
○ Anonymity waived if a suspected person is charged.
Article 3 Obligation to retain data
2002/58/EC, Member States shall adopt measures to ensure that the data specified in Article 5 of this Directive are retained in accordance with the provisions thereof, to the extent that those data are generated or processed by providers of publicly available electronic communications services or of a public communica- tions network within their jurisdiction in the process of supply- ing the communications services concerned.
data are retained under this Directive: (a) data necessary to trace and identify the source of a
communication
(b) data necessary to identify the destination of a
communication
(f) data necessary to identify the location of mobile communi- cation equipment:
retained pursuant to this Directive.
How to deal with anonymity?
○ Force people to register with their true identity
○ U.S. Supreme Court Justice Scalia :“The very purpose of anonymity is to facilitate wrong by eliminating accountability”[Framkin 1995].
○ Banning Tor is neither acceptable nor technically feasible
○ Service providers only responsible if messages are clearly illegal.
Server based Peer to Peer TOR GNUnet Crowds I2P ShadowWalker Freenet NetCamo
random users, the Blender informs the Jondo's of the crowd they are in
random user in the crowd (possibly himself)
either send it to yet another Jondo or send it to its destination
with a key shared by only those two Jondos
request
attack
tunnels
inbound and
network in any order (and even any number
single garlic message
delivery instructions
capacity, updated regularly
tunnel creation
RouterInfo
the identity's DSA signing key
(leases) for a particular client destination.
identity)
messages with (a 4 byte number)
server
research compared to tor
AC has many uses, both legitimate and illegitimate. Produces and helps with legal issues. Many different PETs, all with their own advantage and disadvantages.