CPSC 467: Cryptography and Computer Security

Size: px
Start display at page:

Download "CPSC 467: Cryptography and Computer Security"

Transcription

1 CPSC 467: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 December 2, 2015 CPSC 467, Lecture 23 1/56

2 Anonymous Communication Attacks on Anonymity CPSC 467, Lecture 23 2/56

3 Anonymous Communication CPSC 467, Lecture 23 3/56

4 Anonymity 1 Anonymity is the state of being not identifiable within a set of subjects, the anonymity set. Anonymity set is the set of all possible participants in a system that could have been the sender or recipient of a particular message. Sender anonymity is the state of being not identifiable within the sender anonymity set as the sender of a particular message. Receiver anonymity is the state of being not identifiable within the receiver anonymity set as the receiver of a particular message. 1 A. Pfitzmann and M. Hansen, Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology, 2008 CPSC 467, Lecture 23 4/56

5 Goal of anonymity systems 1 In general, anonymity systems seek to provide unlinkability between sent messages and their true recipients (receiver anonymity), and between received messages and their true senders (sender anonymity). CPSC 467, Lecture 23 5/56

6 Benefits of anonymous communication 2 Investigative journalism Whistleblowing Law enforcement Self-help Avoiding persecution Personal privacy protection 2 R. Kling, Y-C. Lee, and A. Teich, Assessing Anonymous Communication on the Internet: Policy Deliberations, Journal of Information Society, 1999 CPSC 467, Lecture 23 6/56

7 Harms of anonymous communication 2 Spamming Deception Hate mail Impersonation and misrepresentation Online financial fraud Other illegal activities CPSC 467, Lecture 23 7/56

8 Approaches to anonymous communication There are two main approaches to anonymous communication: DC-nets Mix networks CPSC 467, Lecture 23 8/56

9 Dining cryptographers problem 3 Three cryptographers are sitting down to dinner at their favorite three-star restaurant. The waiter informs them that the meal has been paid anonymously by one of the cryptographers or the National Security Agency. The cryptographers respect each other s right to make an anonymous payment, but they wonder if the NSA paid. They find out by executing a two-stage protocol. 3 D. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, 1981 CPSC 467, Lecture 23 9/56

10 DC-nets 1. Establish a secret. Each cryptographer secretly flips an unbiased coin with the cryptographer on his right. 2. Reveal the secret. Each cryptographer says whether the two coins he sees fell on the same side or on different sides. If one of the cryptographers is the payer, he states the opposite of what he sees. If the result is 0, then NSA paid. If it is 1, then one of the cryptographer paid. However, cryptographers who did not pay do not know which one did. CPSC 467, Lecture 23 10/56

11 CPSC 467, Lecture 23 11/56

12 DC-nets The protocol is simple, elegant and unconditionally secure (assuming a secure channel) if carried out faithfully. However, there are three major issues: Collisions if two cryptographers paid for the dinner, their messages will cancel each other out. It means that only one participant can transmit at the same time. Disruptions the last cryptographer can change the final result. Complexity requires pair-wise shared secrets between the cryptographers. CPSC 467, Lecture 23 12/56

13 DC-nets Making DC-nets practical. Collisions proper scheduling of transmissions. Disruptions prevent or detect misbehavior. Complexity use a single master secret to produce shared coin flips. CPSC 467, Lecture 23 13/56

14 Herbivore 4 5 Herbivore is a distributed anonymous communication system, providing private file sharing and messaging over the Internet. It lets people anonymously publish and retrieve documents, and guarantees that even the most resourceful adversary cannot compromise their anonymity. Built to be self-organizing, Herbivore relies on neither central servers nor trusted parties, and ultimately provides anonymity by drawing on its community of users In 2000, FBI began using Carnivore to monitor electronic communications on the Internet. The name Herbivore is a gentle reminder that there is a fine line between law enforcement and harassment. CPSC 467, Lecture 23 14/56

15 Dissent 6 DISSENT stands for Dining cryptographers Shuffled Send Network. It provides anonymity and accountability. Accountability - every honest member for whom the protocol failed gets a proof of some member s misbehavior, and the adversary cannot produce a valid proof of misbehavior by an honest member. 6 H. Corrigan-Gibbs and B. Ford, Dissent: Accountable Group Anonymity, CCS 2010 CPSC 467, Lecture 23 15/56

16 Mix-networks A mix is a process that accepts encrypted messages as input, groups several messages together into a batch, decrypts and forwards some or all of the messages in the batch. A mix network consists of mix routers. Forward the message along a specified path. May intentionally delay sending messages, send them in batches of specified size, etc. Goal: obscure the associations between incoming and outgoing messages. CPSC 467, Lecture 23 16/56

17 Onion routing 7 Onion routing is based on the idea of mix networks. A message is iteratively wrapped with layers of encryption to form an onion that specifies properties of the connection along the route. Each onion router uses its public key to decrypt the entire onion to find the identity of the next onion router, cryptographic information used, and the embedded onion. The router pads the onions and forwards to the next hop. The last node in the chain removes the remaining layer of encryption and forwards the message to its destination. 7 CPSC 467, Lecture 23 17/56

18 Tor (The Onion Router) 8 Tor was originally designed and deployed by the U.S. Naval Research Laboratory for protecting government communications. Today Tor is one of the most useful anonymity tools. The goal is to protect users from network surveillance. Tor is a low latency anonymity network based on onion routing. It consists of a number of Tor relays constantly encrypting and then randomly bouncing messages before delivering them to their final destinations. 8 The Tor Project CPSC 467, Lecture 23 18/56

19 Tor No individual relay ever knows the complete path. The random path packets take is extended one hop at a time, and each relay along the way knows only the previous and the next relay. Neither an eavesdropper nor a compromised relay can link the connection s source and destination. However, Tor cannot (and does not attempt to) protect the traffic entering and exiting the network. Nor it protects users from giving away their identity. CPSC 467, Lecture 23 19/56

20 How Tor works? 9 9 Tor Overview CPSC 467, Lecture 23 20/56

21 How Tor works? CPSC 467, Lecture 23 21/56

22 How Tor works? CPSC 467, Lecture 23 22/56

23 Tor User Statistics Mevade botnet responsible for the spike in Tor traffic, Pierluigi Paganini, September 8, 2013 CPSC 467, Lecture 23 23/56

24 Tor Relay Statistics CPSC 467, Lecture 23 24/56

25 Benefits of Tor CPSC 467, Lecture 23 25/56

26 Tor Hidden Services 10 Tor also offers protection to servers offering various services (websites, instant messaging) by hiding their location. Servers are configured to receive inbound connections through Tor only. They do no reveal their IP address and are accessible only through.onion address. Tor understands.onion addresses and can properly route data to and from hidden services. 10 TOR Hidden Service Protocol CPSC 467, Lecture 23 26/56

27 Step 1: Service Setup Bob chooses some relays, asks them to be his IPs, and tells them his new public key. CPSC 467, Lecture 23 27/56

28 Step 2: Hidden Service Descriptor HDS contains the public key, a summary of IPS, and is signed by Bob. DB returns a HSD for a specific XYZ.onion. CPSC 467, Lecture 23 28/56

29 Step 3: Client Setup Alice gets Bob s HSD, chooses a rendezvous point and gives it a one-time rendezvous cookie to authenticate Bob. CPSC 467, Lecture 23 29/56

30 Step 4: Client Introduction Alice encrypts with Bob s key an introduction message with her RP, Bob s cookie, and her half of DH handshake, then asks Bob s IP to deliver it to him. CPSC 467, Lecture 23 30/56

31 Step 5: Server Response Bob decrypts Alice s message and creates a circuit to RP. He sends the cookie and completes the DH handshake. RP notifies Alice. CPSC 467, Lecture 23 31/56

32 Step 6: Connection Established Alice and Bob have an end-to-end encrypted 6 hop circuit. CPSC 467, Lecture 23 32/56

33 Attacks on Anonymity CPSC 467, Lecture 23 33/56

34 Limitations of existing schemes There s a whole array of attacks on anonymity ranging from exploiting flaws of the anonymous system, leveraging network level information, to exploiting vulnerabilities of the client-side machines. Method Mix Nets, Tor DC Nets Weakness (Active) traffic analysis attacks Anonymous DoS attacks CPSC 467, Lecture 23 34/56

35 Understanding the Adversary Many attacks assume a powerful adversary who can see large chunks of the network at the same time or can obtain large amounts of traffic data. Is an existence of a global adversary a reasonable assumption? CPSC 467, Lecture 23 35/56

36 PRISM 11 Perhaps the most infamous but not the most comprehensive NSA mass surveillance program established in Geared towards collecting the Internet data stored by nine major companies: Facebook, Google, Yahoo, Microsoft, PalTalk, Skype, YouTube, Apple, and AOL. The program operates through a secretive judiciary body called the Foreign Intelligence Surveillance Court. 11 The definitive guide to NSA spy programs, Joe Kloc, August 14, 2013 CPSC 467, Lecture 23 36/56

37 CPSC 467, Lecture 23 37/56

38 CPSC 467, Lecture 23 38/56

39 XKEYSCORE 11 NSA s widest-reaching program. It collects nearly everything a typical user does on the Internet, including the content of s and chats, visible in real time. It builds a searchable database of both metadata and communications content collected from around the world. Metadata is stored for 30 days, while the content for as little as a day. According to a leaked NSA slide, XKEYSCORE database held 41 billion Internet records over a 30 day period. CPSC 467, Lecture 23 39/56

40 XKEYSCORE: Search Capabilities 14 Queries using strong selectors ( addresses) or soft selectors (keywords). 1. Users of Tor and people who search for privacy-enhancing software Extremists aka the readers of Linux Journal NSA targets the privacy-conscious, J. Appelbaum, July 3, NSA: Linux Journal is an extremist forum and its readers get flagged for extra surveillance, Kyle Rankin, July 3, XKEYSCORE Rules CPSC 467, Lecture 23 40/56

41 Where is X-KEYSCORE? 15 Approximately 150 sites and over 700 servers. 15 XKEYSCORE: NSA s Google for the World s Private Communications, The Intercept, M. Marquis-Boire, G. Greenwald, and M. Lee, July 1, 2015 CPSC 467, Lecture 23 41/56

42 Practical Evidence of Traffic Hijacking Researchers from network intelligence firm Dyn Research observed numerous live Man-In-the-Middle (MITM) hijacks last year. Events lasted from minutes to days by attackers from various countries. Traffic improperly redirected by exploiting implicit trust placed in BGP (border gateway protocol). 16 Huge chunks of Internet traffic of financial institutions, government agencies, and network service providers have repeatedly been diverted. 16 Protocol to exchange routing and reachability information between autonomous systems (AS) 17 The New Threat: Targeted Internet Traffic Misdirection, Jim Cowie, Renesys, November 19, Repeated attacks hijack huge chunks of Internet traffic, researchers warn, Dan Goodin, November 20, Strange snafu hijacks UK nuke maker?s traffic, routes it through Ukraine, Dan Goodin, March 13, 2015 CPSC 467, Lecture 23 42/56

43 CPSC 467, Lecture 23 43/56

44 CPSC 467, Lecture 23 44/56

45 CPSC 467, Lecture 23 45/56

46 Traffic Analysis Attack Traffic analysis 20 is the process of analyzing patterns in communication in order to learn some information, frequently the sender s identity. An adversary can be passive and simply monitor the frequency and timing of communication, or be active and affect the communication by performing DoS attacks on chosen nodes, overloading the network on certain links, etc. 20 Sometimes the term is used to describe an adversary simply analyzing one s network activities. CPSC 467, Lecture 23 46/56

47 Traffic Analysis CPSC 467, Lecture 23 47/56

48 Traffic Analysis CPSC 467, Lecture 23 48/56

49 Aqua 21 Alternative high-bandwidth anonymity system that resists traffic analysis. Architecture similar to Tor: the core consists of Aqua servers that clients connect to. Traffic entering and exiting an Aqua network is made indistinguishable through a combination of chaffing and delayed flow start up. Also, traffic from a set of k-clients look indistinguishable and consequently the clients themselves. 21 Towards Efficient Traffic-analysis Resistant Anonymity Networks S. Le Blond et al., ACM SIGCOMM 2013 CPSC 467, Lecture 23 49/56

50 Intersection Attack An intersection attack is a type of a traffic analysis attack that focuses on the relation between online availability of users and certain actions. Assume that a series of anonymous blog posts consistently appears every Monday around 10am. Then, the set of users who have been online each time a post appears contains the blog owner, as opposed to the much bigger set of users who have been online when some posts appeared. An adversary can take snapshots of users available during specific times and intersect them. CPSC 467, Lecture 23 50/56

51 Intersection Attack CPSC 467, Lecture 23 51/56

52 Intersection Attack CPSC 467, Lecture 23 52/56

53 Petraeus-Broadwell Debacle 22 Jill Kelly complains about receiving a series of anonymous stalking s which seem to involve Gen. Petraeus (CIA Director). Mrs. Broadwell was identified as the sender of the s by comparing times when s were sent, locations where the s were sent from, and the lists of all people who were at those locations The investigation reveals an extramarital affair between Gen. Petraeus and Mrs. Broadwell Online PrivacySurveillance and Security Lessons From the Petraeus Scandal, C. Soghoian, November 13, CPSC 467, Lecture 23 53/56

54 Catching the High Country Bandits 23 Two men known as the High Country Bandits robbed 16 banks. FBI didn t have much luck identifying them. Finally, a witness reported a suspicious person a couple of hours before one of the robberies. The FBI asked a judge to approve a full cell tower dump, which included all phone numbers that communicated with a particular tower, from 4 of the robbery locations. Only a single number was included in 3 of the sets and another number in contact with the first one was in 2 sets. Further analysis discovered that both numbers were in most of the 16 robbery locations. They belonged to the two robbers How cell tower dumps caught the High Country Bandits and why it matters, N. Anderson, August 29, CPSC 467, Lecture 23 54/56

55 Buddies 24 Continuously simulate a global adversary to ensure minimum levels of anonymity. Allow to post messages only when safe ( anonymity set > k). Two metrics to measure anonymity: 1. Possinymity - plausible deniability 2. Indinymity - indistinguishability within a buddy set 24 Hang With Your Buddies to Resist Intersection Attacks, D. Wolinsky, E. Syta, and B. Ford,, CCS 2013 CPSC 467, Lecture 23 55/56

56 Additional Resources The Tor Project, How Tor works? by Artist Molly Crabapple and Writer John Leavitt EFF on NSA Spying on Americans The definitive guide to NSA spy programs CPSC 467, Lecture 23 56/56

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 24 December 1, 2014 CPSC 467, Lecture 24 1/46 Anonymous Communication Attacks on Anonymity CPSC 467,

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 25 December 4, 2013 CPSC 467, Lecture 25 1/53 Anonymous Communication Attacks on Anonymity CPSC 467,

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 25 April 18, 2012 CPSC 467b, Lecture 25 1/44 Anonymous Communication DISSENT- Accountable Anonymous

More information

Protocols for Anonymous Communication

Protocols for Anonymous Communication 18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your

More information

Anonymity. Assumption: If we know IP address, we know identity

Anonymity. Assumption: If we know IP address, we know identity 03--4 Anonymity Some degree of anonymity from using pseudonyms However, anonymity is always limited by address TCP will reveal your address address together with ISP cooperation Anonymity is broken We

More information

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal 1 Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016 Advisor: Joan Feigenbaum 2 Overview Introduction Surveillance and Privacy Privacy Principles for

More information

CS Paul Krzyzanowski

CS Paul Krzyzanowski Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide

More information

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes

More information

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a private browsing modes Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,

More information

CS 134 Winter Privacy and Anonymity

CS 134 Winter Privacy and Anonymity CS 134 Winter 2016 Privacy and Anonymity 1 Privacy Privacy and Society Basic individual right & desire Relevant to corporations & government agencies Recently increased awareness However, general public

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

How Alice and Bob meet if they don t like onions

How Alice and Bob meet if they don t like onions How Alice and Bob meet if they don t like onions Survey of Network Anonymisation Techniques Erik Sy 34th Chaos Communication Congress, Leipzig Agenda 1. Introduction to Anonymity Networks Anonymity Strategies

More information

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are!

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are! Context Protocols for anonymity The nternet is a public network: Myrto Arapinis School of nformatics University of Edinburgh Routing information is public: P packet headers contain source and destination

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party Definition Anonymous Communication Hiding identities of parties involved in communications from each other, or from third-parties Who you are from the communicating party Who you are talking to from everyone

More information

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring Onion Routing Varun Pandey Dept. of Computer Science, Virginia Tech 1 What is Onion Routing? a distributed overlay network to anonymize TCP based routing Circuit based (clients choose the circuit) Each

More information

DISSENT: Accountable, Anonymous Communication

DISSENT: Accountable, Anonymous Communication DISSENT: Accountable, Anonymous Communication Joan Feigenbaum http://www.cs.yale.edu/homes/jf/ Joint work with Bryan Ford (PI), Henry Corrigan Gibbs, Ramakrishna Gummadi, Aaron Johnson (NRL), Vitaly Shmatikov

More information

Anonymous communications: Crowds and Tor

Anonymous communications: Crowds and Tor Anonymous communications: Crowds and Tor Basic concepts What do we want to hide? sender anonymity attacker cannot determine who the sender of a particular message is receiver anonymity attacker cannot

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012 Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: Anonymity Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

Anonymity. With material from: Dave Levin and Michelle Mazurek

Anonymity. With material from: Dave Levin and Michelle Mazurek http://www.sogosurvey.com/static/sogo_resp_images/tat_resp_images/designimg/guaranteed-anonymous-survey.png Anonymity With material from: Dave Levin and Michelle Mazurek What is anonymity? Dining cryptographers

More information

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012 Anonymous Communication: DC-nets, Crowds, Onion Routing Simone Fischer-Hübner PETs PhD course Spring 2012 DC (Dining Cryptographers) nets [Chaum 1988 ] Chaum, CACM 28(10), October 1985 Who paid for the

More information

CNT Computer and Network Security: Privacy/Anonymity

CNT Computer and Network Security: Privacy/Anonymity CNT 5410 - Computer and Network Security: Privacy/Anonymity Professor Kevin Butler Fall 2015 When Confidentiality is Insufficient 2 Privacy!= Confidentiality Confidentiality refers to the property of the

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015 Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, autumn 2015 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

ENEE 459-C Computer Security. Security protocols (continued)

ENEE 459-C Computer Security. Security protocols (continued) ENEE 459-C Computer Security Security protocols (continued) Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p

More information

Anonymity and Privacy

Anonymity and Privacy Computer Security Spring 2008 Anonymity and Privacy Aggelos Kiayias University of Connecticut Anonymity in networks Anonymous Credentials Anonymous Payments Anonymous E-mail and Routing E-voting Group,

More information

Anonymity With material from: Dave Levin

Anonymity With material from: Dave Levin Anonymity With material from: Dave Levin http://www.sogosurvey.com/static/sogo_resp_images/tat_resp_images/designimg/guaranteed-anonymous-survey.png What is anonymity? Dining cryptographers Mixnets and

More information

ENEE 459-C Computer Security. Security protocols

ENEE 459-C Computer Security. Security protocols ENEE 459-C Computer Security Security protocols Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p and g public.

More information

CS526: Information security

CS526: Information security Cristina Nita-Rotaru CS526: Information security Anonymity systems. Based on slides by Chi Bun Chan 1: Terminology. Anonymity Anonymity (``without name ) means that a person is not identifiable within

More information

Karaoke. Distributed Private Messaging Immune to Passive Traffic Analysis. David Lazar, Yossi Gilad, Nickolai Zeldovich

Karaoke. Distributed Private Messaging Immune to Passive Traffic Analysis. David Lazar, Yossi Gilad, Nickolai Zeldovich Karaoke Distributed Private Messaging Immune to Passive Traffic Analysis David Lazar, Yossi Gilad, Nickolai Zeldovich 1 Motivation: Report a crime without getting fired You re Fired if you talk to the

More information

Onion services. Philipp Winter Nov 30, 2015

Onion services. Philipp Winter Nov 30, 2015 Onion services Philipp Winter pwinter@cs.princeton.edu Nov 30, 2015 Quick introduction to Tor An overview of Tor Tor is a low-latency anonymity network Based on Syverson's onion routing......which is based

More information

ANONYMOUS CONNECTIONS AND ONION ROUTING

ANONYMOUS CONNECTIONS AND ONION ROUTING I J C I T A E Serials Publications 6(1) 2012 : 31-37 ANONYMOUS CONNECTIONS AND ONION ROUTING NILESH MADHUKAR PATIL 1 AND CHELPA LINGAM 2 1 Lecturer, I. T. Dept., Rajiv Gandhi Institute of Technology, Mumbai

More information

Introduction to Cybersecurity Digital Signatures

Introduction to Cybersecurity Digital Signatures Introduction to Cybersecurity Digital Signatures Lecture Summary Digital Signatures Basic Definitions RSA-based Signatures Attacks 1 Digital signatures Goal of digital signatures: Alice s private key Sign

More information

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reed y Paul Syverson y January 28, 1999 1 Introduction Preserving privacy means not only hiding the content of messages,

More information

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms EJ Jung Goals 1. Hide what you wrote encryption of any kind symmetric/asymmetric/stream 2. Hide to whom you sent and when pseudonym?

More information

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science The Tor Network Cryptography 2, Part 2, Lecture 6 Ruben Niederhagen June 16th, 2014 Tor Network Introduction 2/33 Classic goals of cryptography: confidentiality, data integrity, authentication, and non-repudiation.

More information

CS232. Lecture 21: Anonymous Communications

CS232. Lecture 21: Anonymous Communications CS232 Lecture 21: Anonymous Communications November 21, 2018 2 You Are Not Anonymous 3 Your IP address can be linked directly to you ISPs store communications records Usually for several years (Data Retention

More information

Defining Anonymity in Networked Communication, version 1

Defining Anonymity in Networked Communication, version 1 Defining Anonymity in Networked Communication, version 1 Joan Feigenbaum 1 Technical Report YALEU/DCS/TR- 1448 December 2011 Support for anonymous communication in hostile environments is the main goal

More information

Security and Anonymity

Security and Anonymity Security and Anonymity Distributed Systems need a network to send messages. Any message you send in a network can be looked at by any router or machine it goes through. Further if your machine is on the

More information

communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.

communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U. Introduction to anonymous communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.Leuven) 1 a few words on the scope of the

More information

Anonymous Communications

Anonymous Communications Anonymous Communications Andrew Lewman andrew@torproject.org December 05, 2012 Andrew Lewman andrew@torproject.org () Anonymous Communications December 05, 2012 1 / 45 Who is this guy? 501(c)(3) non-profit

More information

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul THE SECOND GENERATION ONION ROUTER Roger Dingledine Nick Mathewson Paul Syverson 1 -Presented by Arindam Paul Menu Motivation: Why do we need Onion Routing? Introduction : What is TOR? Basic TOR Design

More information

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L Anonymity C S 6 8 2 A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L 2 0 1 9 Tor: The Second- Generation Onion Router R. DINGLEDINE N.

More information

Privacy Enhancing Technologies CSE 701 Fall 2017

Privacy Enhancing Technologies CSE 701 Fall 2017 Privacy Enhancing Technologies Lecture 2: Anonymity Applications Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Anonymous communication mixes, anonymizing proxies,

More information

Dissent: Accountable Anonymous Group Communication

Dissent: Accountable Anonymous Group Communication Dissent: Accountable Anonymous Group Communication Bryan Ford Joan Feigenbaum, David Wolinsky, Henry Corrigan-Gibbs, Shu-Chun Weng, Ewa Syta Yale University Vitaly Shmatikov, Aaron Johnson University of

More information

Analysing Onion Routing Bachelor-Thesis

Analysing Onion Routing Bachelor-Thesis Analysing Onion Routing Bachelor-Thesis Steffen Michels June 22, 2009 Abstract Although methods for reaching security goals such as secrecy, integrity and authentication are widely used in the Internet,

More information

Online Anonymity & Privacy. Andrew Lewman The Tor Project

Online Anonymity & Privacy. Andrew Lewman The Tor Project Online Anonymity & Privacy Andrew Lewman The Tor Project https://torproject.org/ Outline Why anonymity? Crash course on Tor Future Informally: anonymity means you can't tell who did what Who wrote this

More information

You are the internet

You are the internet The Onion Router Hello World I'm Tony I am interested in the concept of security I work for a local ISP / MSP I like skills sharing / access to knowledge Hackspaces are awesome 2 You are the internet DEMO

More information

2 ND GENERATION ONION ROUTER

2 ND GENERATION ONION ROUTER 2 ND GENERATION ONION ROUTER Roger Dingledine, Nick Mathewson and Paul Syverson Presenter: Alejandro Villanueva Agenda Threat model Cells and circuits Other features Related work How does it work? Rendezvous

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

FBI Tor Overview. Andrew Lewman January 17, 2012

FBI Tor Overview. Andrew Lewman January 17, 2012 FBI Tor Overview Andrew Lewman andrew@torproject.org January 17, 2012 Andrew Lewman andrew@torproject.org () FBI Tor Overview January 17, 2012 1 / 28 What are we talking about? Crash course on anonymous

More information

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship.

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship. Tor Tor Anonymity Network Free software that helps people surf on the Web anonymously and dodge censorship. CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk Initially developed at the U.S.

More information

The Loopix Anonymity System

The Loopix Anonymity System The Loopix Anonymity System Ania M. Piotrowska 1 Jamie Hayes 1 Tariq Elahi 2 Sebastian Meiser 1 George Danezis 1 1 University College London, UK 2 KU Leuven 1 / 19 Mixnets Background A set of cryptographic

More information

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

Anonymity With Tor. The Onion Router. July 21, Technische Universität München The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 21, 2011 Overview What is Tor? Motivation Background Material How Tor Works Hidden Services Attacks Specific Attack

More information

Anonymous Connections and Onion Routing

Anonymous Connections and Onion Routing Anonymous Connections and Onion Routing David Goldschlag, Michael Reed, and Paul Syverson Center for High Assurance Computer Systems Naval Research Laboratory Washington, D.C. 1 Who is Talking to Whom?

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Instructor: Mahadevan Gomathisankaran mgomathi@unt.edu CSCE 4550/5550, Fall 2009 Lecture 10 1 Announcements Project Group Due today Attendance Mandatory Ave. 85% ( 4 absentees

More information

Achieving Privacy in Mesh Networks

Achieving Privacy in Mesh Networks Achieving Privacy in Mesh Networks Xiaoxin Wu Intel China Research Center Ltd Beijing, China xiaoxin.wu@intel.com Ninghui Li Department of Computer Science Purdue University West Lafayette, IN 47907-2086,

More information

Privacy defense on the Internet. Csaba Kiraly

Privacy defense on the Internet. Csaba Kiraly Advanced Networking Privacy defense on the Internet Csaba Kiraly 1 Topics Anonymity on the Internet Chaum Mix Mix network & Onion Routing Low-latency anonymous routing 2 Anonymity: Chaum mix David L. Chaum

More information

Crypto meets Web Security: Certificates and SSL/TLS

Crypto meets Web Security: Certificates and SSL/TLS CSE 484 / CSE M 584: Computer Security and Privacy Crypto meets Web Security: Certificates and SSL/TLS Spring 2016 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,

More information

Herbivore: An Anonymous Information Sharing System

Herbivore: An Anonymous Information Sharing System Herbivore: An Anonymous Information Sharing System Emin Gün Sirer August 25, 2006 Need Anonymity Online Current networking protocols expose the identity of communication endpoints Anyone with access to

More information

Anonymity, Usability, and Humans. Pick Two.

Anonymity, Usability, and Humans. Pick Two. Anonymity, Usability, and Humans. Pick Two. Runa A. Sandvik runa@torproject.org 20 September 2011 Runa A. Sandvik runa@torproject.org () Anonymity, Usability, and Humans. Pick Two. 20 September 2011 1

More information

Lecture 8: Privacy and Anonymity Using Anonymizing Networks. CS 336/536: Computer Network Security Fall Nitesh Saxena

Lecture 8: Privacy and Anonymity Using Anonymizing Networks. CS 336/536: Computer Network Security Fall Nitesh Saxena Lecture 8: Privacy and Anonymity Using Anonymizing Networks CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus Jacobson Course Admin HW/Lab 3

More information

Cryptanalysis of a fair anonymity for the tor network

Cryptanalysis of a fair anonymity for the tor network Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane KSecurity, BP 47136, Dakar, Senegal amadou1@gmailcom April 16, 2015 Abstract The aim of this paper is to present an attack upon

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

Tor: Online anonymity, privacy, and security.

Tor: Online anonymity, privacy, and security. Tor: Online anonymity, privacy, and security. Runa A. Sandvik runa@torproject.org 12 September 2011 Runa A. Sandvik runa@torproject.org () Tor: Online anonymity, privacy, and security. 12 September 2011

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security Outline ZKIP Other IP CPSC 467b: Cryptography and Computer Security Lecture 19 Michael J. Fischer Department of Computer Science Yale University March 31, 2010 Michael J. Fischer CPSC 467b, Lecture 19

More information

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München Anonymity With Tor The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 5, 2012 It s a series of tubes. Ted Stevens Overview What is Tor? Motivation Background Material

More information

Telex Anticensorship in the

Telex Anticensorship in the Telex Anticensorship in the Network Infrastructure Eric Wustrow Ian Goldberg * Scott Wolchok J. Alex Halderman University of Michigan University of Michigan * University of Waterloo Background Internet

More information

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 20 th November 2017 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously

More information

CE Advanced Network Security Anonymity II

CE Advanced Network Security Anonymity II CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Anonymity. Christian Grothoff.

Anonymity. Christian Grothoff. christian@grothoff.org http://grothoff.org/christian/ The problem with losing your anonymity is that you can never go back. Marla Maples 1 Agenda Definitions and Metrics Techniques, Research Proposals

More information

Anonymity. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel

Anonymity. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel Anonymity Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 1 Anonymity 2 The Internet can t be censored The Net treats censorship as damage and routes around it. - John Gillmore

More information

Anonymous Communication and Internet Freedom

Anonymous Communication and Internet Freedom Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner May 2, 2013 Goals For Today State-sponsored adversaries Anonymous communication Internet censorship State-Sponsored

More information

Anonymous Communication and Internet Freedom

Anonymous Communication and Internet Freedom Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner April 29, 2016 Announcements Final exam in RSF Fieldhouse, 5/10, arrive by 7PM HW4 due Monday, 5/2, 11:59pm Review

More information

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation.

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation. Tor Hidden Services Roger Dingledine Free Haven Project Electronic Frontier Foundation http://tor.eff.org/ 31 July 2005 Talk Outline Tor overview Circuit-building in Tor Hidden services in Tor Demo Anonymity

More information

Towards measuring anonymity

Towards measuring anonymity Towards measuring anonymity Claudia Díaz, Stefaan Seys, Joris Claessens, and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 0, B-300 Leuven-Heverlee, Belgium claudia.diaz@esat.kuleuven.ac.be http://www.esat.kuleuven.ac.be/cosic/

More information

Dark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA

Dark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA Dark Web Ronald Bishof, MS Cybersecurity This Photo by Unknown Author is licensed under CC BY-SA Surface, Deep Web and Dark Web Differences of the Surface Web, Deep Web and Dark Web Surface Web - Web

More information

BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1

BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1 BBC Tor Overview Andrew Lewman andrew@torproject.org March 7, 2011 Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, 2011 1 / 1 What are we talking about? Crash course on anonymous communications

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

Onion Routing. 1) Introduction. 2) Operations. by Harikrishnan S (M.Tech CSE) Ramji Nagariya (M.S CSE), Sai Sambhu J (M.Tech CSE).

Onion Routing. 1) Introduction. 2) Operations. by Harikrishnan S (M.Tech CSE) Ramji Nagariya (M.S CSE), Sai Sambhu J (M.Tech CSE). Onion Routing by Harikrishnan S (M.Tech CSE) Ramji Nagariya (M.S CSE), Sai Sambhu J (M.Tech CSE). 1) Introduction Onion routing is an infrastructure for private communication over a public network. Traffic

More information

Metrics for Security and Performance in Low-Latency Anonymity Systems

Metrics for Security and Performance in Low-Latency Anonymity Systems Metrics for Security and Performance in Low-Latency Anonymity Systems Tor user Entry node Tor Network Middle node Exit node Bandwidth per node (kb/s) (log scale) 1e+01 1e+03 1e+05 Encrypted tunnel Web

More information

Tor: An Anonymizing Overlay Network for TCP

Tor: An Anonymizing Overlay Network for TCP Tor: An Anonymizing Overlay Network for TCP Roger Dingledine The Free Haven Project http://tor.freehaven.net/ http://tor.eff.org/ December 28, 21C3 2004 Talk Outline Motivation: Why anonymous communication?

More information

anonymous routing and mix nets (Tor) Yongdae Kim

anonymous routing and mix nets (Tor) Yongdae Kim anonymous routing and mix nets (Tor) Yongdae Kim Significant fraction of these slides are borrowed from CS155 at Stanford 1 q Why? Anonymous web browsing 1. Discuss health issues or financial matters anonymously

More information

A Survey of BGP Security Review

A Survey of BGP Security Review A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border

More information

Anonymity Tor Overview

Anonymity Tor Overview Anonymity Tor Overview Andrew Lewman andrew@torproject.org April 21, 2011 Andrew Lewman andrew@torproject.org () Anonymity Tor Overview April 21, 2011 1 / 1 What are we talking about? Crash course on anonymous

More information

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum Paul Syverson (U.S. Naval Research Laboratory) (U.S. Naval

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno CSE 484 / CSE M 584: Computer Security and Privacy Anonymity Mobile Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,

More information

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Onion Routing Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Motivation Public Network Encryption does not hide Routing Information Traffic Analysis Who is Talking to Whom? by analyzing the traffic

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Michael J. Fischer Lecture 4 September 11, 2017 CPSC 467, Lecture 4 1/23 Analyzing Confidentiality of Cryptosystems Secret ballot elections Information protection Adversaries

More information

surveillance & anonymity cs642 computer security adam everspaugh

surveillance & anonymity cs642 computer security adam everspaugh surveillance & anonymity cs642 computer security adam everspaugh ace@cs.wisc.edu today Internet-wide scanning, zmap Massive surveillance, packet inspection Anonymous browsing, TOR TCP handshake Client

More information

The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor

The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor Brief Introduction David A. Vargas Work President, VATG, Inc. Teaching Professor of Networking and Network Security Education

More information

Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981

Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981 Anonymizing Networks Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981 Reed, Syverson, Goldschlag, Anonymous Connections and Onion

More information

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security A Brief Overview of Security & Privacy Issues 1 Topics to Be Covered Cloud computing RFID systems Bitcoin

More information

Anonymity on the Internet. Cunsheng Ding HKUST Hong Kong

Anonymity on the Internet. Cunsheng Ding HKUST Hong Kong Anonymity on the Internet Cunsheng Ding HKUST Hong Kong Part I: Introduc

More information

MIX Network for Location Privacy First Draft

MIX Network for Location Privacy First Draft 2G1319 Communication Systems Design Department of Microelectronics and Information Technology, KTH csd2002-ipv6privacy@2g1319.ssvl.kth.se MIX Network for Location Privacy First Draft O. Sirovatcenko April

More information

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009 Port-Scanning Resistance in Tor Anonymity Network Presented By: Shane Pope (Shane.M.Pope@gmail.com) Dec 04, 2009 In partial fulfillment of the requirements for graduation with the Dean's Scholars Honors

More information

Privacy at the communication layer

Privacy at the communication layer Privacy at the communication layer CS-721 https://spring.epfl.ch/cs721-privacy-at-the-communication-layer/ Carmela Troncoso http://carmelatroncoso.com/ While (course) do { This course End of lecture -

More information

Efficiency of large-scale DC-networks

Efficiency of large-scale DC-networks Bachelor thesis Computer Science Radboud University Efficiency of large-scale DC-networks Author: Moritz Neikes 4099095 m.neikes@student.ru.nl Supervisor: Anna Krasnova anna@mechanical-mind.org Supervisor:

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

Host Website from Home Anonymously

Host Website from Home Anonymously Abstract Host Website from Home Anonymously Prerna Mahajan 1 and Kashish Gupta 2 1 Professor, Department of Computer Science, IITM Janakpuri, New Delhi, India 2 Research Scholar, Department of Computer

More information