• Corpus ID: 6118622

Blindspot: Indistinguishable Anonymous Communications

  title={Blindspot: Indistinguishable Anonymous Communications},
  author={Joseph Gardiner and Shishir Nagaraja},
Communication anonymity is a key requirement for individuals under targeted surveillance. Practical anonymous communications also require indistinguishability - an adversary should be unable to distinguish between anonymised and non-anonymised traffic for a given user. We propose Blindspot, a design for high-latency anonymous communications that offers indistinguishability and unobservability under a (qualified) global active adversary. Blindspot creates anonymous routes between sender-receiver… 

Figures and Tables from this paper

Unobservable Communication over Fully Untrusted Infrastructure

Pung is a key-value store where clients deposit and retrieve messages without anyone-- including Pung's servers--learning of the existence of a conversation, based on private information retrieval, which makes more practical for the setting with new techniques.

Unobservable communication over fully untrusted infrastructure ( extended version ) ⋆

Pung is a key-value store where clients deposit and retrieve messages without anyone— including Pung’s servers—learning of the existence of a conversation, based on private information retrieval, which makes more practical for the setting with new techniques.

A review on machine learning-based approaches for Internet traffic classification

A comprehensive review of various data representation methods, and the different objectives of Internet traffic classification and obfuscation techniques, largely considering the ML-based solutions.



Drac: An Architecture for Anonymous Low-Volume Communications

Drac is a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary using a relay based anonymization mechanism.

X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks

X-Vine is resilient to denial of service via Sybil attacks, and in fact is the first Sybil defense that requires only a logarithmic amount of state per node, making it suitable for large-scale and dynamic settings.

SybilGuard: Defending Against Sybil Attacks via Social Networks

This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks, based on the ldquosocial networkrdquo among user identities, where an edge between two identities indicates a human-established trust relationship.

The Parrot Is Dead: Observing Unobservable Network Communications

This work enumerates the requirements that a censorship-resistant system must satisfy to successfully mimic another protocol and concludes that "unobservability by imitation" is a fundamentally flawed approach.

SkypeMorph: protocol obfuscation for Tor bridges

This work proposes a model in which the client obfuscates its messages to the bridge in a widely used protocol over the Internet, to make it difficult for the censoring adversary to distinguish between the obfuscated bridge connections and actual Skype calls using statistical comparisons.

Crowds: anonymity for Web transactions

The design, implementation, security, performance, and scalability of the Crowds system for protecting users' anonymity on the world-wide-web are described and degrees of anonymity as an important tool for describing and proving anonymity properties are introduced.

Message in a bottle: sailing past censorship

Message In A Bottle is a protocol where any blog post becomes a potential "drop point" for hidden messages, and it is believed that, to achieve resilience to blocking, anti-censorship systems must abandon the idea of having a limited number of entry points.

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks

The novel SybilLimit protocol is presented, which leverages the same insight as SybilGuard but offers dramatically improved and near-optimal guarantees, and provides the first evidence that real-world social networks are indeed fast mixing.

The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications

A model of surveillance based on social network theory, where observing one participant also leaks some information about third parties is presented, to provide important insights into the actual security of anonymous communication, and their ability to minimise surveillance and disruption in a social network.

CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing

A new framework for censorship-resistant web browsing called CensorSpoofer is proposed that addresses this challenge by exploiting the asymmetric nature of web browsing traffic and making use of IP spoofing.