Speaker : | Guillaume Nibert |
Snowpack | |
Date: | 07/02/2024 |
Time: | 10:30 am - 11:30 am |
Location: | Room 4B07 |
Abstract
Anonymity networks play a crucial role in preserving privacy on the Internet by masking users’ identities and guaranteeing the confidentiality of communications. In this talk, we will explore the origins of anonymisation networks through Chaum’s seminal paper on mix networks [1]. Following this paper, research in this area emerged and gave rise to four classes of anonymity networks [2], those based on mixnets, those based on Tor and Onion Routing [3,4], those based on random walks and DHTs, and those based on DCNets [5]. There are others that fall into several classes [2].
We will present some popular networks from these classes and use them in a practical way to connect to different services.
—
References
[1] D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol. 24, no. 2, pp. 84–90, Feb. 1981, doi: 10.1145/358549.358563. Available at: https://www.doi.org/10.1145/358549.358563
[2] F. Shirazi, M. Simeonovski, M. R. Asghar, M. Backes, and C. Diaz, A Survey on Routing in Anonymous Communication Protocols, ACM Computing Surveys, vol. 51, no. 3, p. 51:1-51:39, Jun. 2018, doi: 10.1145/3182658. Available at: https://lirias.kuleuven.be/bitstream/123456789/626536/2/a51-shirazi.pdf
[3] R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-Generation Onion Router, Defense Technical Information Center, Fort Belvoir, VA, Jan. 2004. doi: 10.21236/ADA465464. Available at: https://apps.dtic.mil/sti/citations/ADA465464
[4] D. M. Goldschlag, M. G. Reed, and P. F. Syverson, Hiding Routing information, in Information Hiding, R. Anderson, Ed., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1996, pp. 137–150. doi: 10.1007/3-540-61996-8_37. Available at: https://www.doi.org/10.1007/3-540-61996-8_37
[5] D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, J. Cryptology, vol. 1, no. 1, pp. 65–75, Jan. 1988, doi: 10.1007/BF00206326. Available at: https://www.doi.org/10.1007/BF00206326