Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 -...
Transcript of Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 -...
![Page 1: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/1.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Anonymity
Professor Patrick McDanielCSE545 - Advanced Network Security
Spring 2011
1
![Page 2: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/2.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Anonymity
2
![Page 3: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/3.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
The Internet can’t be censored
“The Net treats censorship as damage and routes around it.”
- John Gillmore
(2011 -- go ask Libya)
![Page 4: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/4.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Actually, none of this is true• It is easy to adopt a pseudonym or a persona on the Internet, but it
is difficult to be truly anonymous
‣ Identities can usually be revealed with cooperation of ISP, local sys-admins, web logs, phone records, etc.
• The Internet can put up a good fight against censorship, but in the end there is still a lot of Internet censorship
‣ Repressive governments and intellectual property lawyers have been pretty successful at getting Internet content removed
‣ Case in point, “the great firewall of China”
![Page 5: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/5.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Why anonymity?• What about in the real world?‣ Do you want people to know which stores, movies, restaurants,
books you make use of?
‣ Do you want everything you say to be associated with you (forever)?
• Are there activities that you would not like to share when surfing the net?‣ With whom?
‣ What about writings (e.g., blogging), new group postings, …
“McDaniel’s programming stupidity example”
![Page 6: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/6.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Degrees of anonymity
Absolute privacy: adversary cannot observe communication
Beyond suspicion: no user is more suspicious than any other
Probable innocence: each user is more likely innocent than not
Possible innocence: nontrivial probability that user is innocent
Exposed (default on web): adversary learns responsible user
Provably exposed: adversary can prove your actions to others
More
Less
![Page 7: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/7.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Software tools• Encryption tools – prevent
others from listening in on your communications‣ File encryption‣ Email encryption‣ Encrypted network
connections
• Anonymity and pseudonymity tools – prevent your actions from being linked to you‣ Anonymizing proxies‣ Mix Networks and similar web
anonymity tools‣ Anonymous email
n Information and transparency tools – make informed choices about how your information will be used«Identity management tools«P3P
nFilters«Cookie cutters«Child protection software
nOther tools«Computer “cleaners”«Privacy suites«Personal firewalls
![Page 8: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/8.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
User view ...• Problem Statement‣ I want to surf the Internet and view content.
‣ … I am concerned that the Websites are going to track me …
‣ … or the government or Insurance agency or some other organization is going to associate me with some community.
• This is a reality: many users may be wary of freely surfing sensitive content‣ Especially when societal stigma involved (e.g., looking for
information on AIDS)
• Incognito (Chrome): disable caching, history, persistent cookies, etc.‣ Does this lead to anonymous browsing?
![Page 9: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/9.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Anonymous email• Anonymous remailers allow people to send email
anonymously
• Similar to anonymous web proxies
‣ Send mail to remailer, which strips out any identifying information (very controversial)
‣ Johan (Julf) Helsingius ~ Penet
• Some can be chained and work like mixes
http://anon.efga.org/~rlist
![Page 10: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/10.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Filters• Cookie Cutters
‣ Block cookies, allow for more fine-grained cookie control, etc.
‣ Some also filter ads, referrer header, and browser chatter
‣ http://www.junkbusters.com/
• Child Protection Software
‣ Block the transmission of certain information via email, chat rooms, or web forms when child is using computer
‣ Limit who a child can email or chat with
‣ http://www.getnetwise.org/
![Page 11: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/11.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Filters (cont.)• Pop-up blockers
‣ Filters more to reduce annoying, rather than protect privacy
‣ Works in similar ways to cookie cutters
‣ Built into newer browsers (Safari)
‣ New York Times - delay content adds
• Web-Bug detectors (not filters)
‣ Highlights invisible .gifs used to track user
http://www.bugnosis.org
![Page 12: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/12.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Proxy solutions
• Acts as a proxy for users
• Hides information from end servers
• Sees all web traffic
• Adds ads to pages (free service; subscription service also available)
http://www.anonymizer.com
Anonymizer
Client Server
![Page 13: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/13.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Proxy solutions
• Acts as a proxy for users
• Hides information from end servers
• Sees all web traffic
• Adds ads to pages (free service; subscription service also available)
http://www.anonymizer.com
AnonymizerRequest
Client Server
![Page 14: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/14.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Proxy solutions
• Acts as a proxy for users
• Hides information from end servers
• Sees all web traffic
• Adds ads to pages (free service; subscription service also available)
http://www.anonymizer.com
AnonymizerRequest Request
Client Server
![Page 15: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/15.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Proxy solutions
• Acts as a proxy for users
• Hides information from end servers
• Sees all web traffic
• Adds ads to pages (free service; subscription service also available)
http://www.anonymizer.com
AnonymizerRequest Request
Reply
Client Server
![Page 16: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/16.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Proxy solutions
• Acts as a proxy for users
• Hides information from end servers
• Sees all web traffic
• Adds ads to pages (free service; subscription service also available)
http://www.anonymizer.com
AnonymizerRequest Request
ReplyReply
Client Server
![Page 17: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/17.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Mixes [Chaum81]• Assume a fully connected
network of nodes
• Peers want to communicate with each but don’t want people to know that they are talking
• Alternately: the sender might not want the receiver to know who she is
• Assumption: nobody can perform traffic analysis
• Suppose E wants to send to B
13
F
D
A
C
B
E
![Page 18: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/18.jpg)
1. E picks a random order of a subset of nodes in the graph. Arbitrarily, shechooses FAC to send message m.
2. E creates a message:E(E(E(E(P |msg), K+
B )|B, k+C )|C, k+
A)|A, k+F )
where P is some random padding and sends it to F .
3. F uses their private key to decrypt the message and recovers:E(E(E(P |msg), K+
B )|B, k+C )|C, k+
A)|AF strips off the trailing A and sends the remainder to C
4. Repeat until B receives E(P |msg), K+B , which unwraps the message and
returns it.
CSE545 - Advanced Network Security - Professor McDaniel Page
Simplified Mix
14
![Page 19: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/19.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Simplified Mix
15
F
D
A
C
B
E
E(E(E(E(P |msg), K+
B )|B, k+C )|C, k+
A)|A, k+F )
E(E(E(P |msg), K+B )|B, k+
C )|C, k+A)
E(E(P |msg), K+B )|B, k+
C )
E(P |msg), K+B )
![Page 20: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/20.jpg)
1. Include a one time key ko and the following in the original message:E(E(E(E(P |E), K+
E )|E, k+D)|D, k+
A)|A, k+F )|F, k0
2. Encrypt the message to be returned, mr using ko, then send to F :E(E(E(E(P |E), K+
E )|E, k+D)|D, k+
A)|A, k+F )|F , E(mr, ko)
3. Now follow the reverse routing back to E.
This is an imperfect solution, can you guess why?
CSE545 - Advanced Network Security - Professor McDaniel Page
(Simplified) Return Address??
16
![Page 21: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/21.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Tor and Friends• Circuit-based version of mix-like routing.
‣ They use things like SSL/TLS to secure peer communication
‣ Build onion circuits that support anonymized communication.
• Challenges:
‣ Doing this fast
‣ Ensure that traffic analysis is very hard
‣ Prevent compromised notes from manipulating the mix to expose the communicating parties
‣ Do key security association management
17
![Page 22: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/22.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Crowds• Users join a Crowd of other users
• Web requests from the crowd cannot be linked to any individual
• Protection from
‣ end servers
‣ other crowd members
‣ system administrators
‣ eavesdroppers
• First system to hide data shadow on the web without trusting a central authority
![Page 23: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/23.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Crowds
1
2
6
3
5
4
35
16
24
Crowd members Web servers
![Page 24: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/24.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Crowds
1
2
6
3
5
4
35
16
24
Crowd members Web servers
![Page 25: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/25.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Crowds
1
2
6
3
5
4
35
16
24
Crowd members Web servers
![Page 26: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/26.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Crowds
1
2
6
3
5
4
35
16
24
Crowd members Web servers
![Page 27: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/27.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Crowds
1
2
6
3
5
4
35
16
24
Crowd members Web servers
![Page 28: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/28.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Crowds
1
2
6
3
5
4
35
16
24
Crowd members Web servers
![Page 29: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/29.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Crowds
1
2
6
3
5
4
35
16
24
Crowd members Web servers
![Page 30: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/30.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Crowds
1
2
6
3
5
4
35
16
24
Crowd members Web servers1.initiator selects a jondo (‘John Doe’), which is another host in crowd2.jondo either
(a) forwards traffic to randomly selected next hop or (b) forwards requests to end server
![Page 31: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/31.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Provider view ..• Problem Statement‣ I want to publish some content
‣ … I am concerned that the Websites are going to track me …
‣ … or the government or Insurance company or some other organization is going to associate me with some community.
• Some countries are very serious about controlling content on the Internet.‣ Software used to anonymously distribute information to
community (political dissident).
![Page 32: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/32.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Anonymous censorship-resistant publishing
• The printing press and the WWW can be powerful revolutionary tools‣ Political dissent
‣ Whistle blowing
‣ Radical ideas
• but those who seek to suppress revolutions have powerful tools of their own
‣ Stop publication
‣ Destroy published materials
‣ Prevent distribution
‣ Intimidate or physically or financially harm author or publisher
![Page 33: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/33.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Anonymity increases censorship-resistance
• Reduces ability to force “voluntary” self-censorship
• Allows some authors to have their work taken more seriously
‣ Reduces bias due to gender, race, ethnic background, social position, etc.
• Many historical examples of important anonymous publications‣ In the Colonies during Revolutionary War when British law
prohibited writings suggesting overthrow of the government
‣ Federalist papers
![Page 34: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/34.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Publius design goals
• Censorship resistant
• Tamper evident
• Source anonymous
• Updateable
• Deniable
• Fault tolerant
• Persistent
• Extensible
• Freely Available
![Page 35: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/35.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Publius Overview
• Publius Content – Static content (HTML, images, PDF, etc)
• Publishers – Post Publius content
• Servers – Host Publius content
• Retrievers – Browse Publius content
Publishers Servers Retrievers
![Page 36: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/36.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Publious
• Generate secret key and use it to encrypt document
• Use “secret splitting” to split key into n shares
• This technique has special property that only k out of n shares are needed to put the key back together
• Publish encrypted document and 1 share on each of n servers
• Generate special Publius URL that encodes the location of each share and encrypted document – example: http://!publius!/1e6adsg673h0==hgj7889340==345lsafdfg
25
Content EncryptedContent
random key K
Encryption
key share 1
key share 2
key share 3
key share 4
key share n
....
EncryptedContent
EncryptedContent
EncryptedContent
EncryptedContent
EncryptedContent
SVR1SVR 1
SVR1SVR 2
SVR1SVR 3
SVR1SVR 4
SVR1SVR n
Sham
ir's
secr
et s
harin
g
key share 1 EncryptedContent
EncryptedContent
EncryptedContent
key share 3
key share 4
Content
random key K
Encryption
Idea: hash of encrypted content and share determines the placement.
![Page 37: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/37.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Publius proxies
• Publius proxies running on a user’s local machine or on the network handle all the publish and retrieve operations
• Proxies also allow publishers to delete and update content
Publishers Servers RetrieversPROXY
PROXY
![Page 38: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/38.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Threats and limitations• Attacks on server resources
‣ 100K Content Limit (easy to subvert)
‣ Server limits # of files it will store
‣ Possibility: use a payment scheme
• Threats to publisher anonymity
• “Rubber-Hose Cryptanalysis”‣ Added “don’t update” and don’t delete bit
• Logging, network segment eavesdropping
• Collaboration of servers to censor content
‣ A feature?
![Page 39: Anonymity - Pennsylvania State Universitypdm12/cse545-s11/slides/cse545-anonymity.pdf · CSE545 - Advanced Network Security - Professor McDaniel Page Why anonymity? • What about](https://reader031.fdocuments.in/reader031/viewer/2022022421/5a87d0a07f8b9a882e8ded50/html5/thumbnails/39.jpg)
CSE545 - Advanced Network Security - Professor McDaniel Page
Discussion• Technology that can protect “good” speech also protects
“bad” speech
• What if your dog does publish your secrets to the Internet and you can't do anything about it?
• Is building a censorship-resistant publishing system irresponsible?
• If a tree falls in a forest and nobody hears it….