e4a6248d42a9b1627f8307d9a9b05aa6.ppt
- Количество слайдов: 40
Privacy Protecting Technologies
Technology: Value Neutral? • Does technology, on average, help or hinder personal privacy?
The Big Idea • We can use technology to improve privacy
Web Browsing • Ad-Subtract • Bugnosis
Ad Subtract
“Search Sanity”
Ad Subtract: Client-Side Java Proxy Advantages: – Multiplatform – Easy to debug – Client/server Disadvantages: – Doesn’t work with SSL – Install footprint – Need to parse HTML
Bugnosis
Bugnosis Features: – Browser helper object – Accesses HTTP & HTTPS – Downloads updates – Designed for journalists
Private Messaging • • PGP – first generation Hush Mail – web based The Martus Project – application specific Disappearing Ink (Omniva) - Deletion
PGP • • Add-on Plug-in S/MIME vs. Open. PGP Political Baggage
Hush Mail • Second-generation • Web-based • Java Crypto Client
Hush Mail
Hush Mail
Hush Mail
Hush Mail
Hush Mail Interface
Hush. Mail Diagram
Disappearing Ink / Omniva • Self-destructing email for people who want to use it. • Why bother? Because it’s hard to delete things
Email gets copies a lot
Mix-Nets, Web & IP transport • • • Chaum’s mix-net scheme The big idea: anonymity needs company 1 mix: you trust the mixer More mixes -> Less Trust Mixing needs to be in space and time
Practical applications of mixers: • Anonymous Remailers • Anonymous Browsing • Anonymous Publishing
Anonymous Remailers • Anonymous posting on Usenet • anon. penet. fi – – – – Based in Finland Operated by Julf Helsingius 70, 000 registered users; 10, 000 messages/day February 1995 – Church of Scientology demands the True Name of a nym an 144108@anon. penet. fi Revealed on February 8 to belong to tc@alumni. caltech. edu under order from Finish Court (Information applied to the Finish court had apparently been somewhat misleading) August 30 – After second court case, anon. penet. fi shut down full details at www. xs 4 all. nl/~kspaink/cos/rnewman/anon/penet. html
Craig’s List
Key features of an anonymous remailer • Strips identity from messages passing through • Provides mapping of nyms to “true names” – But only if replies are important • Optional: – Mixing - only if traffic in and out is observable – Encryption -
Anonymous Web Browsing • Web Caches • Anonymizer • Anonymous Transport Services: – Freedom – Onion Routing
Web Caches cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47: 31 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 0" 200 65536 "http: //aolsearch. aol. com/aol/search? query=fountain+ideas&page=2" "Mozilla/4. 0 (compatible; MSIE 6. 0; AOL 7. 0; Windows NT 5. 1; . NET CLR 1. 0. 3705)“ cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47: 39 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 1" 206 688128 "-" "Mozilla/4. 0 (compatible; MSIE 6. 0; AOL 7. 0; Windows NT 5. 1; . NET CLR 1. 0. 3705)“ cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47: 44 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 1" 206 1024 "-" "Mozilla/4. 0 (compatible; MSIE 6. 0; AOL 7. 0; Windows NT 5. 1; . NET CLR 1. 0. 3705)“ cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 1" 206 75 "-" "Mozilla/4. 0 (compatible; MSIE 6. 0; AOL 7. 0; Windows NT 5. 1; . NET CLR 1. 0. 3705)“ cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47: 52 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 1" 206 725650 "-"
Cache with anonymity
Anonymizer
Private IP Transport • Onion Routing • Freedom
Freedom
Unresolved Issues • How do you buy a book anonymously?
[Anonymous] Publication Systems • anon. penet. fi was really about the right to anonymous publication on Usenet (1996) • Napster (1999 – 2001) • Freenet
References: • EPIC Online Guide to Privacy Protecting tools: • http: //www. epic. org/privacy/tools. html