Anonymous Communication
Anonymous Communication
Anonymous Communication
Anonymous Communication
Clemens H. Cap
ORCID: 0000-0003-3958-6136
Version 2
https://iuk.one/1033-1013
% ½ 1 67 ö È C.H.Cap
Overview Notes for Slide 2 of 67 (Overview )
1. What is Anonymity?
2. Superposed Sending
3. Mix Networks
4. Remailers
5. Onion Routing
6. Further Remarks
%Î ½ 2 67 ö È C.H.Cap
Notes for Slide 3 of 67 ()
2. Superposed Sending
Understanding the concept
and the necessity. 3. Mix Networks
4. Remailers
5. Onion Routing
6. Further Remarks
2 How can I prove a fact to a verifier without the verifier being able to prove the fact himself.
3 How can I split a secret in such a way that a single split provides no knowledge at all but only a certain
number of splits allows the reconstruction of the secret.
Many variants: 4 How can three people calculate a function on three inputs, with the inputs staying private and only the result
becoming public.
Anonymous communication (this unit). 1
5 How can I retrieve information from a server without the server learning in which information items I was
Zero Knowledge Protocols. 2
interested in.
Secret Splitting and Secret Sharing. 3
6 How can I have a cloud provider compute on my data without learning the true nature of my data.
Multi Party Computation. 4
Homomorphic Encryption. 6
2 Keep in mind that many things are prohibited somewhere, world is different in culture, politics, religion and
many other aspects.
Abstract Use Cases
3 For this, google the concept of cookie pricing.
Separating the message from the messenger.
Anti censorship. 4 And that is not necessarily bed.
No tracking.
Escaping unwanted communication (spam).
Voltaire: “I might disagree with your opinion but I will fight that you can voice it freely.”
Distinguish from
Who uses this service? 1
2 Just look at the packets and from where to where they are moving.
3 Somebody injects 500 packets. Do we see anybody within the next 2 seconds receiving 500 packets?
Needs for every solution: 1
4 All kinds of interesting attacks.
1 Protection goals.
2 Attack model. 5 All kinds of interesting thingfs. For example: Let us change the routing and some node or the reachability.
3 Attacker capabilities.
Does this have an impact on retransmissions? From which node?
Typical attacks:
Traffic analysis. 2
Timing attacks. 3
Active attacks. 5
2. Superposed Sending
Charming protocol by David Chaum.
Anecdote of the dining cryptographers. 1
3. Mix Networks
4. Remailers
5. Onion Routing
6. Further Remarks
Observation: In this case the number of 1 among the three broadcast bits is even.
Equivalent: The xor of the three broadcast bits is 0.
Equivalent: We have an invariant of 0 – independently from the specific situation.
Mechanism:
Carry out the above protocol.
If one of the three dinner guests paid,
this person violates the described protocol by broadcasting the opposite result.
Interpretation:
If the invariant still holds: NSA has paid.
If the invariant is violated: One of them has paid.
Sparse Graph: 1
Example:
Ring with secrets shared with left and right neighbor.
If both neighbors conspire, privacy can be revoked.
In complete graph all but one must conspire.
2. Superposed Sending
A low latency solution
for anonymous communication 3. Mix Networks
with a touch of centralization.
4. Remailers
5. Onion Routing
6. Further Remarks
Mechanism:
n ≥ 3 nodes are operating in a linear cascade.
Every node has a (public, private) key pair (ei , di )
Input into first node consists of an onion-like layer e1 (e2 (e3 (m))).
Every mix removes one layer of crypto and forwards to next node.
Traffic analyst sees traffic between nodes and attempts to correlate traffic.
By sequence:
First packet sent to first node corresponds to first packet received from last node.
Prevent by reordering in the node.
By timing:
Prevent by buffering messages for some time.
Leads to (too) high latency.
By content:
Prevent by using (different) encryption from node to node.
By length:
Prevent by sending only messages of one fixed length.
By number of messages:
Prevent by sending decoy traffic.
Evaluation:
Attacker cannot link sender and recipient.
But: Attacker can identify participants in the system (from protocol handshake). 1
General Recommendation
If you once in a while have to send something important with crypto grade security then
always send with crypto grade security in order not to tip-off an attacker. Cryptographic
and anonymous communication should be the default.
2 And finally you learn, they are organizationally independent, but all of them are infiltrated by the NSA or the
KGB.
Problem: Collusion of Mixes
A node should only know its own private key.
How can this be guaranteed
when an entire cascade is operated by a single privacy-service? 1
Problem: Scaling
Security gets better when more and independent nodes use the system
Thought experiment 1: Only 1 node uses the system.
Thought experiment 2: Only 2 nodes use the system.
Thought experiment 3: 1 node plus 500 nodes of the NSA use the system.
Thought experiment 4: 100 different nodes plus 500 nodes of the NSA use the
system.
2. Superposed Sending
High latency solutions
for anonymous communication. 3. Mix Networks
4. Remailers
5. Onion Routing
6. Further Remarks
%Î ½ 34 67 4. Remailers ö È C.H.Cap
4. Remailers Notes for Slide 35 of 67 (Overview)
Overview 1 We can learn a lot from those.
2 People wanted to use the World Wide Web anonymously as well. So, these days, anonymous communication
Today mostly defunct and superseded by other, by low latency tech (TOR, I2P). 2
Sad: High latency remailers would offer much better anonymity than low latency tech.
%Î ½ 35 67 4. Remailers ö È C.H.Cap
4. Remailers Notes for Slide 36 of 67 (4 Types of Classical Remailers)
4 Types of Classical Remailers
%Î ½ 36 67 4. Remailers ö È C.H.Cap
4. Remailers Notes for Slide 37 of 67 (Type 0: Pseudonymous Remailers (1))
Type 0: Pseudonymous Remailers (1)
Mechanism:
Sender provides email address and registers a pseudonym.
Sender sends mail to remailer.
Remailer removes identifying headers.
Remailer fills in pseudonymous address.
Remailer forwards to final recipient.
Receiver replies to pseudonymous address.
Remailer forwards in similar fashion.
%Î ½ 37 67 4. Remailers ö È C.H.Cap
4. Remailers Notes for Slide 38 of 67 (Type 0: Pseudonymous Remailers (2))
Type 0: Pseudonymous Remailers (2)
%Î ½ 38 67 4. Remailers ö È C.H.Cap
4. Remailers Notes for Slide 39 of 67 (Type 1: Cypherpunk Remailers)
Type 1: Cypherpunk Remailers
Idea: Partially solve problem of plain text transport by encryption.
Mechanism:
User retrieves public key of remailer.
User sends encrypted message to remailer with an additional Anon-To header
indicating true recipient
Remailer decrypts
Remailer removes identifying information
Remailer forwards to true recipient in Anon-To header.
Analysis:
Secure against eavesdropping by third parties.
Susceptible against eavesdropping by remailer; user can employ separate encryption.
No reply possible.
Remailer knows sender – but can use chains of remailers.
Susceptible to traffic analysis and replay attacks.
%Î ½ 39 67 4. Remailers ö È C.H.Cap
4. Remailers Notes for Slide 40 of 67 (Type 2: Mixmaster Remailers)
Type 2: Mixmaster Remailers
Analysis:
No reply possible
High latency allows excellent security.
Body may describe a reverse path, but no automatic protocol provided mechanism
Replay attacks possible
%Î ½ 40 67 4. Remailers ö È C.H.Cap
4. Remailers Notes for Slide 41 of 67 (Type 3: Mixminion Remailers (1))
Type 3: Mixminion Remailers (1)
%Î ½ 41 67 4. Remailers ö È C.H.Cap
4. Remailers Notes for Slide 42 of 67 (Type 3: Mixminion Remailers (2))
Type 3: Mixminion Remailers (2) 1 Because nobody is operating mixminion remailers any more and, even worse, nobody is using them, which
reduces the anonymity set.
Analysis:
Great concept, currently mostly defunct. 1
%Î ½ 42 67 4. Remailers ö È C.H.Cap
4. Remailers Notes for Slide 43 of 67 (Other Mail Services)
Other Mail Services
%Î ½ 43 67 4. Remailers ö È C.H.Cap
Notes for Slide 44 of 67 ()
2. Superposed Sending
A low latency solution
for anonymous communication 3. Mix Networks
with strong distribution.
4. Remailers
5. Onion Routing
6. Further Remarks
3 Exit node: Knows the relay node and the resource which is accessed.
TOR Circuit:
Anonymous replacement for TCP protocol.
First set up Tor circuit.
Then use circuit for the remainder of the session.
Normal Tor circuit uses 3 nodes.
Fig. 2: Alice contacts the directory server to obtain a list of Tor nodes. © Rights see appendix.
Fig. 3: Alice builds up a Tor circuit to the node she uses as exit node. © Rights see appendix.
Attack Scenarios:
Attacker controls all three nodes: Can link surfer to website.
Attacker controls guard & exit: Timing and packet number attack on guard & exit.
Important:
Chose the right guard, since the guard knows who you are.
Variant 1: Chose a trusted guard.
Variant 2: Next best option: Chose a random guard once in a while.
Compromises:
Tor is an operative system which requires compromises of performance and anonymity.
Tor does not use padding; some mild padding was introduced recently.
Tor does not use decoy traffic. 1
Fig. 5: This map of Tor relais nodes shows that operating a normal relais node is quite popular. © Rights see appendix.
Fig. 6: Map of Tor exit nodes shows that operating exit nodes is less common in countries known for more restrictive
legal systems. © Rights see appendix.
Basic evaluation: 2 and this is pretty much everything which is illegal somewhere. Because then we are up against strong
opponents.
Open source project.
Active research on Tor security. 3 I certainly would not be using Tor from China.
No, provided:
We assume the existence of a global traffic analyst.
We need interactive, responsive Web 2.0 convenience.
We operate out of Tor-banning countries. 3
Remailer Anonymity:
Attacker knows the email addresses of all receivers.
Attacker knows the email addresses of all sender.
Attacker cannot link a specific sender to a specific receiver.
TOR Anonymity:
Attacker knows the IP address of surfers.
Attacker knows the IP address of servers.
Attacker cannot link a specific surfer to a specific server.
TOR Hidden Service Anonymity:
Attacker knows the IP address of surfers.
Attacker does not know the IP address of a hidden service.
Attacker cannot link a specific surfer to a specific server.
Attacker cannot link a hidden service to a person. 1
2 So there is a unique toplevel domain used for Tor hidden services. Of course, they do not resolve within the
normal DNS service system.
Paradoxical Situation:
Naming: Surfer uses (names, references) a service
without knowing its IP address.
Routing: Surfer routes to a service.
without having or compromising its IP address. 1
Answers:
Use .onion addresses for naming. 2
Problem 1: Attacks.
Traffic correlation & side channel attacks can deanonymize hidden services.
Problem 2: Trust
There is no trust / reputation source, so you can end up at fake sites.
Comparison:
Many conceptual similarities with Tor.
More advanced and flexible than Tor.
Smaller community with less funding, less activity, smaller anonymity set.
2. Superposed Sending
Another solution
and some further problems. 3. Mix Networks
4. Remailers
5. Onion Routing
6. Further Remarks
Mechanism:
Every user is a bus station.
All bus stations from a ring.
There is a bus going around the ring.
At every bus stations messages may “hop on” or “get off” the bus.
Encryption from station to station for every passenger seat prevents tracking.
Constant size of the bus prevents length correlation.
Variants:
Use a second bus going in the opposite direction.
Use different topologies and bus schedules.
Fig. 13: A very large number of self-proclaimed anonymization services are broken. © Rights see appendix.
Part I
Appendix
%Î ½ 68 77 LoF © § → È ö È C.H.Cap
Contents of Appendix Notes for Slide 2 of 8 (Contents of Appendix)
Contents of Appendix
List of Rights ©
Terms of Use §
List of Slides È
%Î ½ 69 77 LoF © § → È ö È C.H.Cap
List of Figures Notes for Slide 3 of 8 (List of Figures )
Die hier angebotenen Inhalte unterliegen deutschem Urheberrecht. Inhalte Dritter werden unter Nennung der Rechtsgrundlage ihrer
Nutzung und der geltenden Lizenzbestimmungen hier angeführt. Auf das Literaturverzeichnis wird verwiesen. Das Zitatrecht in dem für
wissenschaftliche Werke üblichen Ausmaß wird beansprucht. Wenn Sie eine Urheberrechtsverletzung erkennen, so bitten wir um Hinweis
an den auf der Titelseite genannten Autor und werden entsprechende Inhalte sofort entfernen oder fehlende Rechtsnennungen nachholen.
Bei Produkt- und Firmennamen können Markenrechte Dritter bestehen. Verweise und Verlinkungen wurden zum Zeitpunkt des Setzens
der Verweise überprüft; sie dienen der Information des Lesers. Der Autor macht sich die Inhalte, auch in der Form, wie sie zum Zeitpunkt
des Setzens des Verweises vorlagen, nicht zu eigen und kann diese nicht laufend auf Veränderungen überprüfen.
Alle sonstigen, hier nicht angeführten Inhalte unterliegen dem Copyright des Autors, Prof. Dr. Clemens Cap, ©2020. Wenn Sie diese
Inhalte nützlich finden, können Sie darauf verlinken oder sie zitieren. Jede weitere Verbreitung, Speicherung, Vervielfältigung oder
sonstige Verwertung außerhalb der Grenzen des Urheberrechts bedarf der schriftlichen Zustimmung des Rechteinhabers. Dieses dient der
Sicherung der Aktualität der Inhalte und soll dem Autor auch die Einhaltung urheberrechtlicher Einschränkungen wie beispielsweise Par
60a UrhG ermöglichen.
Die Bereitstellung der Inhalte erfolgt hier zur persönlichen Information des Lesers. Eine Haftung für mittelbare oder unmittelbare
Schäden wird im maximal rechtlich zulässigen Ausmaß ausgeschlossen, mit Ausnahme von Vorsatz und grober Fahrlässigkeit. Eine
Garantie für den Fortbestand dieses Informationsangebots wird nicht gegeben.
Die Anfertigung einer persönlichen Sicherungskopie für die private, nicht gewerbliche und nicht öffentliche Nutzung ist zulässig, sofern sie
nicht von einer offensichtlich rechtswidrig hergestellten oder zugänglich gemachten Vorlage stammt.
Use of Logos and Trademark Symbols: The logos and trademark symbols used here are the property of their respective owners. The
YouTube logo is used according to brand request 2-9753000030769 granted on November 30, 2020. The GitHub logo is property of
GitHub Inc. and is used in accordance to the GitHub logo usage conditions https://github.com/logos to link to a GitHub account. The
Tweedback logo is property of Tweedback GmbH and here is used in accordance to a cooperation contract.
%Î ½ 74 77 LoF © § → È ö È C.H.Cap
Terms of Use (2) Notes for Slide 8 of 8 (Terms of Use (2))
Disclaimer: Die sich immer wieder ändernde Rechtslage für digitale Urheberrechte erzeugt für
mich ein nicht unerhebliches Risiko bei der Einbindung von Materialien, deren Status ich nicht
oder nur mit unverhältnismäßig hohem Aufwand abklären kann. Ebenso kann ich den
Rechteinhabern nicht auf sinnvolle oder einfache Weise ein Honorar zukommen lassen, obwohl
ich – und in letzter Konsequenz Sie als Leser – ihre Leistungen nutzen.
Daher binde ich gelegentlich Inhalte nur als Link und nicht durch Framing ein. Lt EuGH Urteil
13.02.2014, C-466/12 ist das unbedenklich, da die benutzten Links ohne Umgehung technischer
Sperren auf im Internet frei verfügbare Inhalte verweisen.
Wenn Sie diese Rechtslage stört, dann setzen Sie sich für eine Modernisierung des völlig
veralteten Vergütungssystems für urheberrechtliche Leistungen ein. Bis dahin klicken Sie bitte
auf die angegebenen Links und denken Sie darüber nach, warum wir keine für das digitale
Zeitalter sinnvoll angepaßte Vergütungssysteme digital erbrachter Leistungen haben.
Zu Risiken und Nebenwirkungen fragen Sie Ihren Rechtsanwalt oder Gesetzgeber.
Weitere Hinweise finden Sie im Netz hier und hier oder hier.
%Î ½ 75 77 LoF © § → È ö È C.H.Cap
Citing This Document Notes for Slide 9 of 8 (Citing This Document)
Typographic Information:
Typeset on July 3, 2021
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020) kpathsea version 6.3.2
This is pgf in version 3.1.5b
This is preamble-slides.tex myFormat©C.H.Cap
%Î ½ 76 77 LoF © § → È ö È C.H.Cap
List of Slides Notes for Slide 9 of 8 (Citing This Document)