Anonymous Routing & Anonymous Web Surfing: Caleb Cain & Savi Medlang
Anonymous Routing & Anonymous Web Surfing: Caleb Cain & Savi Medlang
Anonymous Routing & Anonymous Web Surfing: Caleb Cain & Savi Medlang
● Network Structure
○ Topology
○ Connection Type
○ Symmetry
● Routing Information
○ Update Frequency
● Communication Model
○ Routing Type
○ Scheduling
○ Node Selection
● Performance and Deployability Source:http://www.prometheusanalytics.net/products/promethe
○ Latency us-networks
A Survey on Routing in Anonymous Communication Protocols
1. Mixnet Based Protocols
2. Onion Routing Protocols
3. DHT-Based Protocols
4. DCNets
5. Misc
Vulnerabilities
- Survey of attacks on anonymity networks
- Intersection Attacks
- Packet Counting Attacks
- Fingerprinting Attacks
- Ignorance of Data
Vulnerabilities - Freenet
- Grand Forks, North Dakota
arrest
- BCI planted computers in
the network
Source:https://www.grandforksherald.com/news/4250527-former-pri
ncipal-charged-child-porn-had-many-roles-close-children
Vulnerabilities - Mix Networks
- Poor quality of service
- High Latencies
- Unreliability
- Don’t scale well
- Not a history of reliable protocols
- Compulsion Attacks
Vulnerabilities - Onion Router
- Focused on preventing traffic analysis
- Accepts network observation & traffic confirmation
- Sybil Attacks
Source: https://coincentral.com/sybil-attack-blockchain/
Anonymous Web Browsers
Source: https://gulyas.info/files/publications/GulyasG_SPACE08.pdf
Anonymous Web Browsers