What can encryption not hide on the internet?
Routing information
What is anonymity?
A user may user a service or resource without disclosing the users identity
What does 3DC stand for (protocol)?
Three-party dinning cryptographers
What does the 3DS protocol do?
Reveals if the NSA paid or one of the cryptographers (but not which cryptographer)
What is the 3DS protocol?
What makes 3DS protocol impractical?
What’s the idea behind Crowds protocol?
Randomly route requests through a crowd of users
How does the Crowds protocol work?
What is the Crowd protocol not resistant against?
An attacker which sees the whole network
How does Chaum’s work?
Why are messages buffered in Chaum’s Mix?
Avoid time correlation attack’s
Why are dummy messages sent in Chaum’s mix?
If the attacker sends n - 1 messages to mix (with capacity n) he can link the sender of the nth message
How can you deal with the problem that some mixes may be corrupted in Chaum’s mix?
Send messages through a sequence of mixes, as long as a single mix is honest you have guaranteed anonymity
What are the limitations of Chaum’s mix?
What does onion routing not defend against?
- End to end timing attacks
How does onion routing work?
How does an end-to-end timing attack work on Tor?
An attacker that controls the entry and exit node can delay a message, if the message was delayed at the exit node then they likely came from the client connecting to the entry node
Why does the client not do DNS requests before onion routing?
Tor works over TCP, DNS is UDP so it would not be anonymous
How does DNS work with Tor?
The exit node performs DNS on the address
What are Tor onion services?
Services that can only be accessed via the Tor network, protecting the anonymity of the user and the server