24C3 - 1.01
24th Chaos Communication Congress
Volldampf voraus!
Referenten | |
---|---|
Len Sassaman |
Programm | |
---|---|
Tag | Tag 1 (2007-12-27) |
Raum | Saal 2 |
Beginn | 16:00 |
Dauer | 01:00 |
Info | |
ID | 2401 |
Veranstaltungstyp | lecture |
Track | Hacking |
Sprache | en |
Feedback | |
---|---|
Haben Sie diese Veranstaltung besucht? Feedback abgeben |
Anonymity for 2015
Why not just use Tor?
In recent years, an increasing amount of academic research has been focused on secure anonymous communication systems. In this talk, we briefly review the state of the art in theoretical anonymity systems as well as the several deployed and actively used systems such as Tor and Mixmaster, and explain their advantages and limitations.
We will then describe the pseudonym system we are developing as an example for a new paradigm for low-latency anonymous communications, based on an information-theoretic secure private information retrieval protocol. This protocol is designed to be secure against an adversary with unbounded computing power as long as (as little as) a single honest server exists in the network of servers operating this system. We will explain the design decisions behind the architecture of the system, intended to be operated by volunteers with a limited resource pool. We will discuss the usability considerations in designing a system intended to be accessible to a more naive user-base than simply "hackers and cypherpunks", and explain why user accessibility is critical to the security of anonymity systems in general.
Finally, we will speculate on the potential to utilize these anonymity primitives for low-latency systems, which, if possible, could provide a more reliable and secure alternative to circuit-based or mix-based anonymity network systems.