Anonymous Communication Flashcards

1
Q

Alternative to cookies for user tracking

A

Browser fingerprinting based on features and configuration settings of the browser (language etc) that are accessible without any permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sender anonymity

A

Adversary knows receiver
adversary may learn message
sender is unknown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

receiver anonymity

A

adversary knows sender
adversary may choose message
receiver is unknown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sender-receiver unklinkability

A

adversary knows senders and receivers
link between senders and receivers is unknown
anonymity -> unlinkability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

unobservability

A

adversary cannot tell whether any com. is taking place
Wireless:: DSSS
Wired: always send
unobservability -> anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Batching and mixing

A
  • proxy collects number of messages before forwarding and mix order of messages.
  • messages need to be indistinguishable.
  • use multiple proxies (mixes) to avoid single point of failure
  • layered encryption

ISSUE:

  • Intersection attack possible (without cover traffic)
  • low performance (mainly due to batching)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intersection attack

A
  • everytime a message is seen by the target, register sets of destinations
  • narrow it down over time
    Solution: Covertraffic fopr unobservability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Direct circuit setup

A
  • establish state on relays by using normal packets
  • sender knows the established keys in advance (based on long-term public keys of relays)
  • -> no forward secrecy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Telescopic circuit setup

A
  • keys are negotiated one relay at a time
  • ID of R2 is encrypted with ephemeral session key of R1
  • slower but offers immediate forward secrecy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Circuit tear-down

A
  • can be initiated by sender and by intermediate relays
  • ## sender communicates tear-down to one relay at a time, starting from the furthest away
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attacks on circuit based systems

A
  • traffic analysis: flow fingerprinting, webseite fingerprinting
  • TCP fingerprinting: analize TCP protocol implementation (sol: per hop tcp)
  • trick users into downloading malware
  • any gap will break anonymity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tor basics

A

circuits over 3 relays

  • per hop tcp
  • per hop tls (except last hop)
  • features: cencorship resistance (bridges), exit policies, hidden services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tor relay_early

A

relay_early enforces maximal path length of 9 to prevent cheap DoS.

  • extend cells can only be contained in relay_early cells.
  • each relay allows only 8 relay_early cells per circuit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

hidden services

A
  • anonymize server (Bob)
  • hash of Bobs public key is identifier of hidden service
  • Bob has connection so a set of introduction points
  • Alice connects to IP and suggests rendezvous
  • traffic never leaves tor network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

directory authorities

A
  • 10 directory authorities (DA) run consensus to keep state of relays
  • weakness: adversary needs to compromise 5 authority servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cencorshop resistance tor

A
  • contains bridge relays which are not publicly listed
  • Issue: deep packet inspection allows detection of tor traffic
  • Sol: obfuscate traffic