Privacy Enhancing Technologies for the Internet, Parts I and II - - PowerPoint PPT Presentation

privacy enhancing technologies for the internet parts i
SMART_READER_LITE
LIVE PREVIEW

Privacy Enhancing Technologies for the Internet, Parts I and II - - PowerPoint PPT Presentation

Privacy Enhancing Technologies for the Internet, Parts I and II Ian Goldberg, David Wagner, Eric Brewer presented by Nikita Borisov ECE598NB - Spring 2006 Motivation Threats to privacy Online actions monitored Information


slide-1
SLIDE 1

Privacy Enhancing Technologies for the Internet, Parts I and II

Ian Goldberg, David Wagner, Eric Brewer presented by Nikita Borisov

ECE598NB - Spring 2006

slide-2
SLIDE 2

2 Jan 19, 2006 ECE598NB

Motivation

  • Threats to privacy

– Online actions monitored – Information recorded and preserved for years

  • Hard drives cost ~40 cents/GB

– Mining and extraction of information

  • Phone number, address, SSN

– “dossier effect” – Government

slide-3
SLIDE 3

3 Jan 19, 2006 ECE598NB

Anonymity

  • Tool to achieve privacy

– Data not tied to you nearly as good as private data – “physical security through anonymity”

  • Anonymity commonplace outside internet

– Federalist papers – HIV tests – Police tips – Journalists – Postal service – Phone calls – Cash

slide-4
SLIDE 4

4 Jan 19, 2006 ECE598NB

  • Double edged sword

– Good and bad uses for anonymity – Q: The political climate has changed since 1997; is anonymity doomed?

slide-5
SLIDE 5

5 Jan 19, 2006 ECE598NB

Past (pre 1997)

  • Type 0 remailers

– Strip off headers – Create reply address

From: nikita@uiuc.edu -> From: anon123@anon.penet.fi

– Store reply mapping:

To: anon123@anon.penet.fi -> To: nikita@uiuc.edu

slide-6
SLIDE 6

6 Jan 19, 2006 ECE598NB

  • Type 0: Problems

– Single point of trust – Identity table - permanent storage of private information – Eavesdroppers

  • Anon.penet.fi shut down after subpoena
slide-7
SLIDE 7

7 Jan 19, 2006 ECE598NB

Cypherpunk Remailers

  • Type I

– Basically Chaumian mixes (next week) – Chain of remailers

  • Distributes trust

– Reorder messages – Layered Encryption

  • Prevents eavesdropping
slide-8
SLIDE 8

8 Jan 19, 2006 ECE598NB

Present (as of 1997)

  • Type II remailers

– Constant size messages – Replay attack prevention – Smarter Reordering – Cover traffic (in theory)

slide-9
SLIDE 9

9 Jan 19, 2006 ECE598NB

Other Anon. Mail Technologies

  • Nym servers

– Reply blocks

  • alt.anonymous.messages
  • premail

– User interfaces matter

  • Anonymous email “nearly solved”

– What do you think?

slide-10
SLIDE 10

10 Jan 19, 2006 ECE598NB

Privacy for not mail

  • Anonymous web browsing:

anonymizer.com

– Like type 0 remailers – Still (!) exists

  • DigiCash

– Note: needs anonymity to be useful – Limited anonymity: payer only – Lack of adoption

slide-11
SLIDE 11

11 Jan 19, 2006 ECE598NB

Future (predictions in 1997)

  • DigiCash improvements
  • Bi-directional anonymity
  • More flexible use model
  • Netscape plugin
  • Low-latency anonymity
  • Pipenet Design
  • Onion Routing
  • Trades off security and privacy in favor of peformance and

robustness

  • Is it better to have weak privacy and

deployability, or strong privacy and no user base?

slide-12
SLIDE 12

12 Jan 19, 2006 ECE598NB

Abuse

  • Abuse

– Already becoming a problem in 1997 – Spam – Harassment

  • Dealing with abuse

– Simplistic spam alarms – Receiver filtering (!) – Responding to political pressure

  • What kind of abuse is there today?
slide-13
SLIDE 13

13 Jan 19, 2006 ECE598NB

Other challenges

  • Anonymous publication
  • Electronic voting
  • Application-specific privacy
  • Deployment
slide-14
SLIDE 14

14 Jan 19, 2006 ECE598NB

Motto

  • “Privacy through technology, not

legislation”

– What do you think?

slide-15
SLIDE 15

15 Jan 19, 2006 ECE598NB

Part II: Present (2002)

  • Crowds: anonymous web surfing

– Forward requests among a crowd before going to the web server – No cryptography – Plausible deniability

  • JAP

– Remailer concept for network traffic

slide-16
SLIDE 16

16 Jan 19, 2006 ECE598NB

Anonymous Publication

  • Free Haven
  • FreeNet
  • Publius

– Distribute data among many nodes – Encrypt contents, protecting servers

slide-17
SLIDE 17

17 Jan 19, 2006 ECE598NB

Onion Routing

  • NRL Onion Routing project
  • Zero-Knowledge System’s Freedom

Network

– Commercial venture – Paid other organizations to operate servers – User base too small, costs too high – Is there hope for commercial anonymity?

slide-18
SLIDE 18

18 Jan 19, 2006 ECE598NB

Electronic Cash

  • The death of electronic payments

– DigiCash failed – So did other payment schemes – Critical mass problem – Financial regulations

  • Private credentials

– Generalize electronic cash

slide-19
SLIDE 19

19 Jan 19, 2006 ECE598NB

Failure of Privacy Technology

  • Anonymizer.com is the only success

– Weak protection – Little infrastructure – Other models of revenue

  • Privacy barriers

– Infrastructure costs – Network effects

slide-20
SLIDE 20

20 Jan 19, 2006 ECE598NB

Privacy Technology Spectrum

  • Single party

– ad blocker, cookie scrubbers, …

  • Centralized intermediary

– Anonymizer.com, anon.penet.fi

  • Distributed Intermediary

– Freedom Network, remailers, Crowds

  • Server support

– Digital cash

slide-21
SLIDE 21

21 Jan 19, 2006 ECE598NB

Peer-to-peer

  • A natural fit for privacy technologies

– Address the issue of expensive infrastructure – Distribute trust – P2P users tend to want privacy

  • Reputation becoming important

– Ebay, Slashdot, Advogato – (all of these centralized) – Are there any P2P reputation systems today?

slide-22
SLIDE 22

22 Jan 19, 2006 ECE598NB

Identity vs PII

  • Identity versus Personally Identifiable

Information

– Credit card # – Zip code – Favorites

  • Personal information tools

– Cookies – P3P – Enterprise privacy

slide-23
SLIDE 23

23 Jan 19, 2006 ECE598NB

Tech vs. Law

  • A lot of privacy legislation has been

introduced

  • Were technologists wrong?
  • They were right for security, but not for

privacy

  • Privacy involves how other people handle

your data

– You want your doctor to know your history, but not share it with marketers

slide-24
SLIDE 24

24 Jan 19, 2006 ECE598NB

Tech vs. Law

  • What about anonymity, digital cash?
  • If laws are the answer, what are we as

technologists to do?

slide-25
SLIDE 25

25 Jan 19, 2006 ECE598NB

Other Comments on the Paper

slide-26
SLIDE 26

26 Jan 19, 2006 ECE598NB

Part III?

  • 4 more years have passed
  • What do you think has changed?