[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Open access

Seeking anonymity in an internet panopticon

Published: 28 September 2015 Publication History

Abstract

The Dissent system aims for a quantifiably secure, collective approach to anonymous communication online.

References

[1]
Borisov, N., Danezis, G., Mittal, P., and Tabriz, P. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, VA, Oct. 29--Nov. 2). ACM Press, New York, 2007.
[2]
Brickell, J. and Shmatikov, V. Efficient anonymity-preserving data collection. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Philadelphia, PA, Aug. 20--23). ACM Press, New York, 2006.
[3]
Chaum, D. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1, 1 (1988), 65--75.
[4]
Corrigan-Gibbs, H., Wolinsky, D.I., and Ford, B. Proactively accountable anonymous messaging in Verdict. In Proceedings of the 22nd USENIX Security Symposium (Washington, D.C., Aug. 14--16). USENIX Association, Berkeley, CA, 2013.
[5]
Danezis, G., Dingledine, R., and Mathewson, N. Mixminion: Design of a type III anonymous remailer protocol. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (Oakland, CA, May 11--14). IEEE Computer Society Press, Los Alamitos, CA, 2003.
[6]
Dingledine, R. and Murdoch, S.J. Performance improvements on Tor, or why Tor is slow and what we're going to do about it. Presented at DEFCON 17 (Las Vegas, NV, July 30--Aug. 2, 2009); https://svn.torproject.org/svn/projects/roadmaps/2009-03-11-performance.pdf
[7]
Evans, N.S., Dingledine, R., and Grothoff, C. A practical congestion attack on Tor using long paths. In Proceedings of the 18th USENIX Security Symposium (Montreal, Canada, Aug. 10--14). USENIX Association, Berkeley, CA, 2009.
[8]
Feigenbaum, J., Johnson, A., and Syverson, P. Probabilistic analysis of onion routing in a black-box model. ACM Transactions on Information and System Security 15, 3 (2012), article 14.
[9]
Gallagher, R. New Snowden documents show NSA deemed Google networks a 'target.' Slate (Sept. 9, 2013).
[10]
Gellman, B., Timberg, C., and Rich, S. Secret NSA documents show campaign against Tor encrypted network. The Washington Post (Oct. 4, 2013).
[11]
Goldschlag, D.M., Reed, M.G., and Syverson, P.F. Hiding routing information. In Proceedings of the First International Workshop on Information Hiding (Cambridge, U.K., May 30--June 1). Springer, Berlin, 1996.
[12]
Johnson, A., Wacek, C., Jansen, R., Sherr, M., and Syverson, P. Users get routed: Traffic correlation on Tor by realistic adversaries. In Proceedings of the 20th ACM Conference on Computer and Communications Security (Berlin, Germany, Nov. 4--8). ACM Press, New York, 2013.
[13]
Le Blond, S., Choffnes, D., Zhou, W., Druschel, P., Ballani, H., and Francis, P. Towards efficient traffic-analysis resistant anonymity networks. In Proceedings of ACM SIGCOMM 2013 (Hong Kong, China, Aug. 12--16). ACM Press, New York, 2013.
[14]
Mathewson, N. and Dingledine, R. Practical traffic analysis: Extending and resisting statistical disclosure. In Proceedings of the Fourth Workshop on Privacy Enhancing Technologies (Toronto, Canada, May 24--26). Springer, Berlin, 2004.
[15]
Neff, C.A. A verifiable secret shuffle and its application to e-voting. In Proceedings of the Eighth ACM Conference on Computer and Communications Security (Philadelphia, PA, Nov. 6--8). ACM Press, New York, 2001.
[16]
Risen, J. and Poitras, L. NSA report outlined goals for more power. The New York Times (Nov. 22, 2013).
[17]
Segal, A., Ford, B., and Feigenbaum, J. Catching bandits and only bandits: Privacy-preserving intersection warrants for lawful surveillance. In Proceedings of the Fourth USENIX Workshop on Free and Open Communications on the Internet (San Diego, CA, Aug. 18). USENIX Association, Berkeley, CA, 2014.
[18]
Sirer, E.G., Goel, S., Robson, M., and Engin, D. Eluding carnivores: File sharing with strong anonymity. In Proceedings of the 11th ACM SIGOPS European Workshop (Leuven, Belgium, Sept. 19--22). ACM Press, New York, 2004.
[19]
Syta, E., Johnson, A., Corrigan-Gibbs, H., Weng, S.-H, Wolinsky, D.I., and Ford, B. Security analysis of accountable anonymity in Dissent. ACM Transactions on Information and System Security 17, 1 (2014), article 4.
[20]
Tor. Anonymity Online; https://www.torproject.org
[21]
Tor. Metrics portal; http://metrics.torproject.org
[22]
Watts. R. JK Rowling unmasked as author of acclaimed detective novel. The Telegraph (July 13, 2013).
[23]
Wolinsky, D.I., Corrigan-Gibbs, H., Johnson, A., and Ford, B. Dissent in numbers: Making strong anonymity scale. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (Hollywood, CA, Oct. 8--10). USENIX Association, Berkeley, CA, 2012.
[24]
Wolinsky, D.I., Jackowitz, D., and Ford, B. Managing NymBoxes for identity and tracking protection. In Proceedings of the 2014 Conference on Timely Results in Operating Systems (Broomfield, CO, Oct. 5). USENIX Association, Berkeley, CA, 2014.
[25]
Wolinsky, D.I., Syta, E., and Ford, B. Hang with your buddies to resist intersection attacks. In Proceedings of the 20th ACM Conference on Computer and Communications Security (Berlin, Germany, Nov. 4--8). ACM Press, New York, 2013.

Cited By

View all
  • (2024)A Design Theory for Transparency of Information Privacy PracticesInformation Systems Research10.1287/isre.2019.023935:3(956-977)Online publication date: 1-Sep-2024
  • (2023)Omniptikon Döneminde İş Etiğinin İşletme Stratejilerine Entegrasyonunun ÖnemiThe Importance of Integrating Business Ethics into Business Strategy in the Omnipticon EraEskişehir Osmangazi Üniversitesi Sosyal Bilimler Dergisi10.17494/ogusbd.127857924:2(381-399)Online publication date: 31-Jul-2023
  • (2018)Technical Tools and Designs for Data ProtectionDesigning for Privacy and its Legal Framework10.1007/978-3-319-98624-1_6(101-148)Online publication date: 4-Nov-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 58, Issue 10
October 2015
87 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2830674
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 September 2015
Published in CACM Volume 58, Issue 10

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)566
  • Downloads (Last 6 weeks)114
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Design Theory for Transparency of Information Privacy PracticesInformation Systems Research10.1287/isre.2019.023935:3(956-977)Online publication date: 1-Sep-2024
  • (2023)Omniptikon Döneminde İş Etiğinin İşletme Stratejilerine Entegrasyonunun ÖnemiThe Importance of Integrating Business Ethics into Business Strategy in the Omnipticon EraEskişehir Osmangazi Üniversitesi Sosyal Bilimler Dergisi10.17494/ogusbd.127857924:2(381-399)Online publication date: 31-Jul-2023
  • (2018)Technical Tools and Designs for Data ProtectionDesigning for Privacy and its Legal Framework10.1007/978-3-319-98624-1_6(101-148)Online publication date: 4-Nov-2018
  • (2018)Strengthening Privacy by DesignDesigning for Privacy and its Legal Framework10.1007/978-3-319-98624-1_10(227-244)Online publication date: 4-Nov-2018
  • (2016)What Make You Sure that Health Informatics Is SecureProceedings of the 14th International Conference on Inclusive Smart Cities and Digital Health - Volume 967710.1007/978-3-319-39601-9_40(443-448)Online publication date: 25-May-2016

View Options

View options

PDF

View or Download as a PDF file.

PDFChinese translation

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media