scispace - formally typeset
Open Access

Challenges in deploying low-latency anonymity

Reads0
Chats0
TLDR
Drawing on the experiences deploying Tor (the second-generation onion routing network), social challenges and technical issues that must be faced in building, deploying, and sustaining a scalable, distributed, low-latency anonymity network are described.
Abstract
There are many unexpected or unexpectedly difficult obstacles to deploying anonymous communications. Drawing on our experiences deploying Tor (the second-generation onion routing network), we describe social challenges and technical issues that must be faced in building, deploying, and sustaining a scalable, distributed, low-latency anonymity network.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Inferring the source of encrypted HTTP connections

TL;DR: This work examines the effectiveness of two traffic analysis techniques, based upon classification algorithms, for identifying encrypted HTTP streams, and gives evidence that these techniques will exhibit the scalability necessary to be effective on the Internet.
Proceedings ArticleDOI

Locating hidden servers

TL;DR: This work presents fast and cheap attacks that reveal the location of a hidden server, the first actual intersection attacks on any deployed public network: thus confirming general expectations from prior theory and simulation.
Proceedings ArticleDOI

Low-resource routing attacks against tor

TL;DR: The extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources is shown.
Book ChapterDOI

Timing analysis in low-latency mix networks: attacks and defenses

TL;DR: In this article, the problem of defending low-latency mix networks against attacks based on correlating interpacket intervals on two or more links of the mix chain is investigated.
Journal ArticleDOI

On anonymity in an electronic society: A survey of anonymous communication systems

TL;DR: The previous research done to design, develop, and deploy systems for enabling private and anonymous communication on the Internet are surveyed, including mixes and mix networks, onion routing, and Dining Cryptographers networks are surveyed.
References
More filters
ReportDOI

Tor: the second-generation onion router

TL;DR: This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.
Journal ArticleDOI

Anonymous connections and onion routing

TL;DR: Anonymous connections and their implementation using onion routing are described and several application proxies for onion routing, as well as configurations of onion routing networks are described.
Proceedings ArticleDOI

Anonymous connections and onion routing

TL;DR: A detailed specification of the implemented onion routing system, a vulnerability analysis based on this specification, and performance results are provided.
Proceedings ArticleDOI

Tarzan: a peer-to-peer anonymizing network layer

TL;DR: Measurements show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route, and Protocols toward unbiased peer-selection offer new directions for distributing trust among untrusted entities.
Proceedings ArticleDOI

Mixminion: design of a type III anonymous remailer protocol

TL;DR: Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters.