The Katzenpost Mix Network System · David Stainton This project has received funding from the...

Preview:

Citation preview

HE DATA KRAKEN is an

ancient oracle of

wisdom and knowledge.

It was requested by people from

all over the world and shared

its knowledge. But the oracle

became hungry for information…

http://www.fubiz.net/wp-content/uploads/2012/03/the-kraken-existence2.jpg

The Katzenpost Mix Network System

David Stainton

This project has received funding from the European Union’s Horizon 2020research and innovation programme under the Grant Agreement No 653497,Privacy and Accountability in Networks via Optimized Randomized Mix-nets

(Panoramix)”.

June 13, 2019

“we kill people based on metadata”–Michael Hayden (Ex-NSA andEx-CIA Director)

David Chaum. Untraceable electronic mail, return addresses, anddigital pseudonyms, Comm. ACM, 24, 2 (Feb. 1981)

See:

Claudia Diaz & Andrei Serjantov. Generalising Mixes. PETS 2003

n-1 Attacks

From a Trickle to a Flood: Active Attacks on Several Mix Types byAndrei Serjantov and Roger Dingledine and, Paul Syverson

Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, andGeorge Danezis. The Loopix Anonymity System Usenix 26, 2017.

λM

Heartbeat Traffic to Counter (n-1) Attacksby George Danezis and Len Sassaman

λM

Impact of Network Topology onAnonymity and Overhead in Low-Latency Anonymity Networks

by Claudia Diaz, Stephen Murdoch and, Carmela TroncosoPETS 2010

Epistemic Attacks

Route Fingerprinting in Anonymous Communicationsby George Danezis and Richard Clayton

Statistical Disclosure Attacks

Statistical Disclosure orIntersection Attacks on Anonymity Systemsby George Danezis and Andrei Serjantov

Attacks do not always converge on success; depends on howrepetitive and predictable client behavior is.

Sphinx: A Compact and Provably Secure Mix Formatby George Danezis and Ian GoldbergIEEE Security and Privacy 2009

Compulsion Attacks

I legal action

I police raid

I pwn

Compulsion Attacks Defenses via Mix Key Erasure

“Forward Secure Mixes” by George Danezis, Proceedings of 7thNordic Workshop on Secure IT Systems, 2002

“Xolotl: A request-and-forward mixnet format with selectivestatefulness for forward secure and hybrid post-quantumanonymity” by Jeffrey Burdges and Christian Grothoff

Other Defenses for Compulsion Attacks

”Compulsion Resistant Anonymous Communications” by GeorgeDanezis and Jolyon Clulow, Proceedings of Information HidingWorkshop, June 2005

“No right to ramain silent: Isolating Malicious Mixes” by HemiLeibowitz, Ania Piotrowska, George Danezis and Amir Herzberg

“Two Cents for Strong Anonymity: The Anonymous Post-officeProtocol” by Nethanel Gelernter, Amir Herzberg, and HemiLeibowitz

“Anonymity Trilemma”by Das, Meiser, Mohammadi, Kate (2017)Anonymity cannot scale better than |cover traffic| · |latency|

Take aways: Tor’s situation: |cover traffic| ∗ 0 = 0

λPλLλD

λD

λL

λL

λP

The Katzenpost Free Software Project

Website:https://katzenpost.mixnetworks.org/

Github:https://github.com/katzenpost/

IRC: #katzenpost on OFTC

Contact me:

I E-mail: dawuud@riseup.net

I Twitter: @david415

Recommended