tor and wikipedia
play

Tor and Wikipedia Roger Dingledine The Free Haven Project 1 - PowerPoint PPT Presentation

Tor and Wikipedia Roger Dingledine The Free Haven Project 1 Motivation China blocks Wikipedia; Wikipedia blocks Tor edits. Thousands(?) of Tor users would like to edit Wikipedia but can't. (I'm not saying you must allow Tor edits


  1. Tor and Wikipedia Roger Dingledine The Free Haven Project 1

  2. Motivation ● China blocks Wikipedia; Wikipedia blocks Tor edits. ● Thousands(?) of Tor users would like to edit Wikipedia but can't. ● (I'm not saying you must allow Tor edits – I just want to explain some technical possibilities.) 2

  3. We have to make some assumptions about what the attacker can do. Alice Anonymity network Bob watch Alice! watch (or be!) Bob! Control part of the network! Etc, etc. 3

  4. Anonymity serves different interests for different user groups. Governments Businesses Anonymity “It's privacy!” Private citizens 4

  5. Anonymity serves different interests for different user groups. Governments Businesses “It's network security!” Anonymity “It's privacy!” Private citizens 5

  6. Anonymity serves different interests for different user groups. Governments Businesses “It's traffic-analysis “It's network security!” resistance!” Anonymity “It's privacy!” Private citizens 6

  7. The simplest designs use a single relay to hide connections. Bob1 Alice1 Bob3,“X” “Y” Relay Alice2 Bob2 “Z” Bob1, “Y” “X” ” Z “ , 2 b o B Bob3 Alice3 (ex: some commercial proxy providers) 7

  8. So, add multiple relays so that no single one can betray Alice. Bob Alice R1 R3 R5 R4 R2 8

  9. Alice makes a session key with R1 Bob Alice R1 R3 R5 R4 R2 9

  10. Alice makes a session key with R1 ...And then tunnels to R2 Bob Alice R1 R3 R5 R4 R2 10

  11. Alice makes a session key with R1 ...And then tunnels to R2...and to R3 Bob Alice R1 R3 R5 R4 R2 11

  12. Can multiplex many connections through the encrypted circuit Bob Alice R1 R3 Bob2 R5 R4 R2 12

  13. Some problems with IP addresses as authenticators ● AOL has a dozen IP addresses. ● Open proxies, misconfigured computers, botnets, ... ● Dynamic IPs ● Universities (and countries!) with only a few IP addresses ● Tor 13

  14. 14

  15. Tor and Abuse ● Tor has hundreds of thousands of active users these days, and pushes >600Mbps of traffic, mostly web browsing. ● We have our share of jerks, just like the Internet in general. ● If an anonymity system works well, nobody hears about it. So “hearsay” is not on our side. 15

  16. Bug 550 and its solution (Thanks Tim!) ● Two new config options: For some IP addresses, – Let people edit, but only if they're logged in. – Don't let people create new accounts. 16

  17. Still some problems ● People can create accounts elsewhere and “spend” them at once. ● People who don't have unblocked IPs still lose. 17

  18. Key concept ● Add speedbumps only for blocked IPs. Yes, IP addresses can give you a hint, but they're not authenticators. ● 1) edits need to prove that they're worthwhile; or better, ● 2) accounts need to prove that they're worthwhile. 18

  19. But slowing down users is bad! ● AKA: “it's hard to do CAPTCHAs that work for blind people” ● You're blocking them completely right now. At least this way, we let some of them edit. 19

  20. How much abuse then? ● “But there will be so much abuse to wade through, this can't possibly work.” ● If the abuse doesn't go directly to the website, the jerks will go to a new avenue – so the number of edits/accounts we need to approve will be pretty much the actual number. 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend