0% found this document useful (0 votes)
57 views1 page

Nymble Blocking Misbehaving Users in Anonymizing Networks

The document discusses how some users of anonymizing networks like Tor have misused the anonymity to deface websites, forcing website administrators to blacklist the entire anonymizing network and deny access to well-behaving anonymous users. It introduces Nymble, an open-source system that allows servers to blacklist individual misbehaving anonymous users while maintaining users' privacy through efficient cryptographic operations.

Uploaded by

Mahesh Ibs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views1 page

Nymble Blocking Misbehaving Users in Anonymizing Networks

The document discusses how some users of anonymizing networks like Tor have misused the anonymity to deface websites, forcing website administrators to blacklist the entire anonymizing network and deny access to well-behaving anonymous users. It introduces Nymble, an open-source system that allows servers to blacklist individual misbehaving anonymous users while maintaining users' privacy through efficient cryptographic operations.

Uploaded by

Mahesh Ibs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Nymble Blocking Misbehaving Users in Anonymizing

Networks

Anonymizing networks such as Tor route traffic through independent nodes in separate
administrative domains to hide a client’s IP address. Unfortunately, some users have misused
such networks under the cover of anonymity users have repeatedly defaced popular websites
such as Wikipedia. Since web-site administrators cannot blacklist individual malicious users’ IP
addresses, they blacklist the entire anonymizing network. Such measures eliminate malicious
activity through anonymizing networks at the cost of denying anonymous access to behaving
users. In other words, a few “bad apples” can spoil the fun for all. (This has happened repeatedly
with Tor.

• Blacklisting anonymous users: We provide a means by which servers can blacklist users
of an anonymizing network while maintaining their privacy.
• Practical performance: Our protocol makes use of inexpensive symmetric
cryptographic operations to significantly outperform the alternatives.
• Open-source implementation: With the goal of contributing a workable system, we
have built an open source implementation of Nymble, which is publicly available. We
provide performance statistics to show that our system is indeed practical.

Technology

Front End : .Net


Back End : Sqlserver

You might also like