• Corpus ID: 6118622

Blindspot: Indistinguishable Anonymous Communications

  title={Blindspot: Indistinguishable Anonymous Communications},
  author={Joseph Gardiner and Shishir Nagaraja},
Communication anonymity is a key requirement for individuals under targeted surveillance. Practical anonymous communications also require indistinguishability - an adversary should be unable to distinguish between anonymised and non-anonymised traffic for a given user. We propose Blindspot, a design for high-latency anonymous communications that offers indistinguishability and unobservability under a (qualified) global active adversary. Blindspot creates anonymous routes between sender-receiver… 

Figures and Tables from this paper

Unobservable Communication over Fully Untrusted Infrastructure

Pung is a key-value store where clients deposit and retrieve messages without anyone-- including Pung's servers--learning of the existence of a conversation, based on private information retrieval, which makes more practical for the setting with new techniques.

Unobservable communication over fully untrusted infrastructure ( extended version ) ⋆

Pung is a key-value store where clients deposit and retrieve messages without anyone— including Pung’s servers—learning of the existence of a conversation, based on private information retrieval, which makes more practical for the setting with new techniques.

A review on machine learning-based approaches for Internet traffic classification

A comprehensive review of various data representation methods, and the different objectives of Internet traffic classification and obfuscation techniques, largely considering the ML-based solutions.



Drac: An Architecture for Anonymous Low-Volume Communications

Drac is a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary using a relay based anonymization mechanism.

X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks

X-Vine is resilient to denial of service via Sybil attacks, and in fact is the first Sybil defense that requires only a logarithmic amount of state per node, making it suitable for large-scale and dynamic settings.

SybilGuard: Defending Against Sybil Attacks via Social Networks

This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks, based on the ldquosocial networkrdquo among user identities, where an edge between two identities indicates a human-established trust relationship.

The Parrot Is Dead: Observing Unobservable Network Communications

This work enumerates the requirements that a censorship-resistant system must satisfy to successfully mimic another protocol and concludes that "unobservability by imitation" is a fundamentally flawed approach.

SkypeMorph: protocol obfuscation for Tor bridges

This work proposes a model in which the client obfuscates its messages to the bridge in a widely used protocol over the Internet, to make it difficult for the censoring adversary to distinguish between the obfuscated bridge connections and actual Skype calls using statistical comparisons.

Crowds: anonymity for Web transactions

The design, implementation, security, performance, and scalability of the Crowds system for protecting users' anonymity on the world-wide-web are described and degrees of anonymity as an important tool for describing and proving anonymity properties are introduced.

Message in a bottle: sailing past censorship

Message In A Bottle is a protocol where any blog post becomes a potential "drop point" for hidden messages, and it is believed that, to achieve resilience to blocking, anti-censorship systems must abandon the idea of having a limited number of entry points.

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks

The novel SybilLimit protocol is presented, which leverages the same insight as SybilGuard but offers dramatically improved and near-optimal guarantees, and provides the first evidence that real-world social networks are indeed fast mixing.

CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing

A new framework for censorship-resistant web browsing called CensorSpoofer is proposed that addresses this challenge by exploiting the asymmetric nature of web browsing traffic and making use of IP spoofing.

Stegobot: A Covert Social Network Botnet

Analysis of Stegobot's network throughput indicates that stealthy as it is, it is also functionally powerful - capable of channeling fair quantities of sensitive data from its victims to the botmaster at tens of megabytes every month.