privacy enhancing technologies for the internet parts i
play

Privacy Enhancing Technologies for the Internet, Parts I and II - PowerPoint PPT Presentation

Privacy Enhancing Technologies for the Internet, Parts I and II Ian Goldberg, David Wagner, Eric Brewer presented by Nikita Borisov ECE598NB - Spring 2006 Motivation Threats to privacy Online actions monitored Information


  1. Privacy Enhancing Technologies for the Internet, Parts I and II Ian Goldberg, David Wagner, Eric Brewer presented by Nikita Borisov ECE598NB - Spring 2006

  2. Motivation • Threats to privacy – Online actions monitored – Information recorded and preserved for years • Hard drives cost ~40 cents/GB – Mining and extraction of information • Phone number, address, SSN – “dossier effect” – Government Jan 19, 2006 ECE598NB 2

  3. Anonymity • Tool to achieve privacy – Data not tied to you nearly as good as private data – “physical security through anonymity” • Anonymity commonplace outside internet – Federalist papers – HIV tests – Police tips – Journalists – Postal service – Phone calls – Cash Jan 19, 2006 ECE598NB 3

  4. • Double edged sword – Good and bad uses for anonymity – Q: The political climate has changed since 1997; is anonymity doomed? Jan 19, 2006 ECE598NB 4

  5. Past (pre 1997) Type 0 remailers • – Strip off headers – Create reply address From: nikita@uiuc.edu -> From: anon123@anon.penet.fi – Store reply mapping: To: anon123@anon.penet.fi -> To: nikita@uiuc.edu Jan 19, 2006 ECE598NB 5

  6. • Type 0: Problems – Single point of trust – Identity table - permanent storage of private information – Eavesdroppers • Anon.penet.fi shut down after subpoena Jan 19, 2006 ECE598NB 6

  7. Cypherpunk Remailers • Type I – Basically Chaumian mixes (next week) – Chain of remailers • Distributes trust – Reorder messages – Layered Encryption • Prevents eavesdropping Jan 19, 2006 ECE598NB 7

  8. Present (as of 1997) • Type II remailers – Constant size messages – Replay attack prevention – Smarter Reordering – Cover traffic (in theory) Jan 19, 2006 ECE598NB 8

  9. Other Anon. Mail Technologies • Nym servers – Reply blocks • alt.anonymous.messages • premail – User interfaces matter • Anonymous email “nearly solved” – What do you think? Jan 19, 2006 ECE598NB 9

  10. Privacy for not mail • Anonymous web browsing: anonymizer.com – Like type 0 remailers – Still (!) exists • DigiCash – Note: needs anonymity to be useful – Limited anonymity: payer only – Lack of adoption Jan 19, 2006 ECE598NB 10

  11. Future (predictions in 1997) • DigiCash improvements - Bi-directional anonymity - More flexible use model - Netscape plugin - Low-latency anonymity - Pipenet Design - Onion Routing - Trades off security and privacy in favor of peformance and robustness - Is it better to have weak privacy and deployability, or strong privacy and no user base? Jan 19, 2006 ECE598NB 11

  12. Abuse • Abuse – Already becoming a problem in 1997 – Spam – Harassment • Dealing with abuse – Simplistic spam alarms – Receiver filtering (!) – Responding to political pressure • What kind of abuse is there today? Jan 19, 2006 ECE598NB 12

  13. Other challenges • Anonymous publication • Electronic voting • Application-specific privacy • Deployment Jan 19, 2006 ECE598NB 13

  14. Motto • “Privacy through technology, not legislation” – What do you think? Jan 19, 2006 ECE598NB 14

  15. Part II: Present (2002) • Crowds: anonymous web surfing – Forward requests among a crowd before going to the web server – No cryptography – Plausible deniability • JAP – Remailer concept for network traffic Jan 19, 2006 ECE598NB 15

  16. Anonymous Publication • Free Haven • FreeNet • Publius – Distribute data among many nodes – Encrypt contents, protecting servers Jan 19, 2006 ECE598NB 16

  17. Onion Routing • NRL Onion Routing project • Zero-Knowledge System’s Freedom Network – Commercial venture – Paid other organizations to operate servers – User base too small, costs too high – Is there hope for commercial anonymity? Jan 19, 2006 ECE598NB 17

  18. Electronic Cash • The death of electronic payments – DigiCash failed – So did other payment schemes – Critical mass problem – Financial regulations • Private credentials – Generalize electronic cash Jan 19, 2006 ECE598NB 18

  19. Failure of Privacy Technology • Anonymizer.com is the only success – Weak protection – Little infrastructure – Other models of revenue • Privacy barriers – Infrastructure costs – Network effects Jan 19, 2006 ECE598NB 19

  20. Privacy Technology Spectrum • Single party – ad blocker, cookie scrubbers, … • Centralized intermediary – Anonymizer.com, anon.penet.fi • Distributed Intermediary – Freedom Network, remailers, Crowds • Server support – Digital cash Jan 19, 2006 ECE598NB 20

  21. Peer-to-peer • A natural fit for privacy technologies – Address the issue of expensive infrastructure – Distribute trust – P2P users tend to want privacy • Reputation becoming important – Ebay, Slashdot, Advogato – (all of these centralized) – Are there any P2P reputation systems today? Jan 19, 2006 ECE598NB 21

  22. Identity vs PII • Identity versus Personally Identifiable Information – Credit card # – Zip code – Favorites • Personal information tools – Cookies – P3P – Enterprise privacy Jan 19, 2006 ECE598NB 22

  23. Tech vs. Law • A lot of privacy legislation has been introduced • Were technologists wrong? • They were right for security, but not for privacy • Privacy involves how other people handle your data – You want your doctor to know your history, but not share it with marketers Jan 19, 2006 ECE598NB 23

  24. Tech vs. Law • What about anonymity, digital cash? • If laws are the answer, what are we as technologists to do? Jan 19, 2006 ECE598NB 24

  25. Other Comments on the Paper Jan 19, 2006 ECE598NB 25

  26. Part III? • 4 more years have passed • What do you think has changed? Jan 19, 2006 ECE598NB 26

Recommend


More recommend