Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
HE DATA KRAKEN is an
ancient oracle of
wisdom and knowledge.
It was requested by people from
all over the world and shared
its knowledge. But the oracle
became hungry for information…
http://www.fubiz.net/wp-content/uploads/2012/03/the-kraken-existence2.jpg
The Katzenpost Mix Network System
David Stainton
This project has received funding from the European Union’s Horizon 2020research and innovation programme under the Grant Agreement No 653497,Privacy and Accountability in Networks via Optimized Randomized Mix-nets
(Panoramix)”.
June 13, 2019
“we kill people based on metadata”–Michael Hayden (Ex-NSA andEx-CIA Director)
David Chaum. Untraceable electronic mail, return addresses, anddigital pseudonyms, Comm. ACM, 24, 2 (Feb. 1981)
See:
Claudia Diaz & Andrei Serjantov. Generalising Mixes. PETS 2003
n-1 Attacks
From a Trickle to a Flood: Active Attacks on Several Mix Types byAndrei Serjantov and Roger Dingledine and, Paul Syverson
Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, andGeorge Danezis. The Loopix Anonymity System Usenix 26, 2017.
λM
Heartbeat Traffic to Counter (n-1) Attacksby George Danezis and Len Sassaman
λM
Impact of Network Topology onAnonymity and Overhead in Low-Latency Anonymity Networks
by Claudia Diaz, Stephen Murdoch and, Carmela TroncosoPETS 2010
Epistemic Attacks
Route Fingerprinting in Anonymous Communicationsby George Danezis and Richard Clayton
Statistical Disclosure Attacks
Statistical Disclosure orIntersection Attacks on Anonymity Systemsby George Danezis and Andrei Serjantov
Attacks do not always converge on success; depends on howrepetitive and predictable client behavior is.
Sphinx: A Compact and Provably Secure Mix Formatby George Danezis and Ian GoldbergIEEE Security and Privacy 2009
Compulsion Attacks
I legal action
I police raid
I pwn
Compulsion Attacks Defenses via Mix Key Erasure
“Forward Secure Mixes” by George Danezis, Proceedings of 7thNordic Workshop on Secure IT Systems, 2002
“Xolotl: A request-and-forward mixnet format with selectivestatefulness for forward secure and hybrid post-quantumanonymity” by Jeffrey Burdges and Christian Grothoff
Other Defenses for Compulsion Attacks
”Compulsion Resistant Anonymous Communications” by GeorgeDanezis and Jolyon Clulow, Proceedings of Information HidingWorkshop, June 2005
“No right to ramain silent: Isolating Malicious Mixes” by HemiLeibowitz, Ania Piotrowska, George Danezis and Amir Herzberg
“Two Cents for Strong Anonymity: The Anonymous Post-officeProtocol” by Nethanel Gelernter, Amir Herzberg, and HemiLeibowitz
“Anonymity Trilemma”by Das, Meiser, Mohammadi, Kate (2017)Anonymity cannot scale better than |cover traffic| · |latency|
Take aways: Tor’s situation: |cover traffic| ∗ 0 = 0
λPλLλD
λD
λL
λL
λP
The Katzenpost Free Software Project
Website:https://katzenpost.mixnetworks.org/
Github:https://github.com/katzenpost/
IRC: #katzenpost on OFTC
Contact me:
I E-mail: [email protected]
I Twitter: @david415