10
Presenting: Dafna Shahaf

Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

  • View
    221

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

Presenting: Dafna Shahaf

Page 2: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

Infranet: Circumventing Web Censorship and Surveillance

Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger

Page 3: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,
Page 4: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

+ IP, key

?

Page 5: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

+ IP, key

3. Hide( )

Challenge!2. Hide( BBC.com )

1. Tunnel

Page 6: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

Discussion (1)

• James Bond movie!– Response of U.S. Army?

• Human component: software distribution • Assumptions– Scope of possible attacks from the censor?– Censor does not want to affect normal users– Downsampling images?

Page 7: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

Discussion (2)

• Detecting responders by analyzing downstream traffic– Errors? See if hash changes?

• Other schemes– Random numbers in hyperlinks?

• Overhead seems significant– Requests adequately spaced

• Human factors– Altruism– Fear of punishment

Page 8: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall

Page 9: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

Problem

• Packets still carry header information– Cleartext – Can be used to identify and track users

• Solution: Slyfy– Use predetermined aliases – Encapsulating protocol

Page 10: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,

Discussion

• Surprise• Deployment:

– Different encryption mechanism– Cold start

• Large reduction in throughput – De-emphasized, deal breaker

• Wireless– Who does the sender trust?

• Mechanism for distributing symmetric keys reveals too much?– Solved(?)