Onions for Sale: Putting Privacy on the Market Rob Jansen Aaron Johnson Paul Syverson U.S. Naval Research Laboratory Presented by: Alessandro Acquisti.

Slides:



Advertisements
Similar presentations
Aaron Johnson with Joan Feigenbaum Paul Syverson
Advertisements

Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
Symantec 2010 Windows 7 Migration Global Results.
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Introduction to Graphing The Rectangular Coordinate System Scatterplots.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
Analysis of Financial Statements
1
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
STATISTICS INTERVAL ESTIMATION Professor Ke-Sheng Cheng Department of Bioenvironmental Systems Engineering National Taiwan University.
Addition and Subtraction Equations
Trusted Query Network (TQN) A Novel Approach to Generating Information Security Data Vijay Vaishnavi Richard Baskerville Art Vandenberg Jack Zheng Department.
Disability status in Ethiopia in 1984, 1994 & 2007 population and housing sensus Ehete Bekele Seyoum ESA/STAT/AC.219/25.
Tennessee Higher Education Commission Higher Education Recommendations & Finance Overview November 15, 2012.
CALENDAR.
Chapter 7 Sampling and Sampling Distributions
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
The 5S numbers game..
A Fractional Order (Proportional and Derivative) Motion Controller Design for A Class of Second-order Systems Center for Self-Organizing Intelligent.
B2B Solutions Study Summary Charts June – September 2013.
Break Time Remaining 10:00.
The basics for simulations
A sample problem. The cash in bank account for J. B. Lindsay Co. at May 31 of the current year indicated a balance of $14, after both the cash receipts.
PP Test Review Sections 6-1 to 6-6
Employee & Manager Self Service Overview
MCQ Chapter 07.
Dynamic Access Control the file server, reimagined Presented by Mark on twitter 1 contents copyright 2013 Mark Minasi.
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
Progressive Aerobic Cardiovascular Endurance Run
Adding Up In Chunks.
FAFSA on the Web Preview Presentation December 2013.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
TCCI Barometer September “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
When you see… Find the zeros You think….
Employment Ontario Program Updates EO Leadership Summit – May 13, 2013 Barb Simmons, MTCU.
2011 WINNISQUAM COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=1021.
Before Between After.
2011 FRANKLIN COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=332.
Subtraction: Adding UP
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
WorkKeys Internet Version Training
Static Equilibrium; Elasticity and Fracture
FIGURE 12-1 Op-amp symbols and packages.
famous photographer Ara Guler famous photographer ARA GULER.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
Copyright © 2013 Pearson Education, Inc. All rights reserved Chapter 11 Simple Linear Regression.
Lial/Hungerford/Holcomb/Mullins: Mathematics with Applications 11e Finite Mathematics with Applications 11e Copyright ©2015 Pearson Education, Inc. All.
Physics for Scientists & Engineers, 3rd Edition
Comparison between tillage transect and supplementary data GLPF Grant- Team meeting #5 July 23-24, 2013.
A Data Warehouse Mining Tool Stephen Turner Chris Frala
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
Schutzvermerk nach DIN 34 beachten 05/04/15 Seite 1 Training EPAM and CANopen Basic Solution: Password * * Level 1 Level 2 * Level 3 Password2 IP-Adr.
LIRA: Lightweight Incentivized Routing for Anonymity Rob Jansen Aaron Johnson Paul Syverson U.S. Naval Research Laboratory 20th Annual Network & Distributed.
Onion Routing Security Analysis Aaron Johnson U.S. Naval Research Laboratory DC-Area Anonymity, Privacy, and Security Seminar.
Toward Understanding Congestion in Tor DC-area Anonymity, Privacy, and Security Seminar January 24 th, 2014 Rob Jansen U.S. Naval Research Laboratory *Joint.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Never Been KIST: Tor’s Congestion Management Blossoms with Kernel- Informed Socket Transport 23 rd USENIX Security Symposium August 20 th 2014 Rob JansenUS.
The Silk Road: An Online Marketplace
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum
PeerFlow: Secure Load Balancing in Tor Aaron Johnson1 Rob Jansen1 Aaron Segal2 Nicholas Hopper3 Paul Syverson1 1U.S. Naval Research Laboratory 2Yale.
Performance Enhancements for Tor
Exercise ?: TOR.
Presentation transcript:

Onions for Sale: Putting Privacy on the Market Rob Jansen Aaron Johnson Paul Syverson U.S. Naval Research Laboratory Presented by: Alessandro Acquisti Financial Cryptography 2013

Problem: Tor is slow Web (320 KiB) Bulk (5 MiB) File download distributions over Tor and PlanetLab

Exit ProbabilityAdvertised BandwidthNickname 7.25%0.87%chaoscomputerclub %0.93%chaoscomputerclub %1.48%herngaard 3.60%0.66%chomsky 3.35%1.17%dorrisdeebrown 3.32%1.18%bolobolo1 3.26%0.65%rainbowwarrior 2.32%0.36%sdnettor %0.69%TheSignul 2.22%0.41%raskin 2.05%0.40%bouazizi 1.93%0.65%assk 1.82%0.39%kramse 1.67%0.35%BostonUCompSci 1.53%0.40%bach Total 48.82% compass.torproject.org Problem: Few, overloaded Tor relays Top 15 Exit Relays

Problem: Other solutions often provide weak traffic security Examples – Virtual Private Networks Often leak communication partners [1] Not designed for a strong adversary Single point of trust – File upload sites Inherently reveal connection with upload site Single point of trust – Filesharing seedboxes Connections to seedboxes are observed Single point of trust

Solution: Allow users to pay Tor for preferential network service. Use the money to grow the Tor network. prioritized normal $ 1. User pays for e- cash. 3. User sends relays on onion-routing circuit e-cash to obtain priority. 2. Payment funds relay. $

Tor has an estimated 500,000 unique users per day. How many new and existing users would pay for better performance? SSL VPN: $506 million business in 2008 [2] File upload sites: estimated 7% of Internet traffic in 2011 [3] BitTorrent: estimated 14.3% of Internet traffic in 2011 [3] and 52% of Tor traffic in 2010 [4]. $

prioritized normal How to prioritize? Proportional Differentiated Services [5] Why prioritize? Requiring all users to pay hasnt worked in the past [6]. Prioritizing traffic ensures users with little money or low risk will continue using Tor.

Anonymity Users identify themselves as paying or non-paying to relays on the circuit. An exit can link the destination to a the paying or non-paying group of users. Users must be aware of the risk of joining the new paying group. As more join, it becomes more anonymous. Paying users Non-paying users Tor

Technical challenge: Accepting payments Payments should be possible without requiring user identification or traceability to Tor. – Third-party payment processor Google Wallet PayPal Amazon Payments – Bitcoin Tor currently accepts donations in such forms (excepting Bitcoin)

Technical challenge: growing the Tor network Added capacity should offset the relative slowdown of non-paying users. Tor should not centralize control and liability of relays. Torservers.net – a separate non-profit that takes money to run relays - provides a model for using payments. How will existing relay operators respond to new monetary incentives? $

References 1.Appelbaum, J., Ray, M., Koscher, K., Finder, I., vpwns: Virtual pwned networks. FOCI, Girard, J., Magic Quadrant for SSL VPNs. Gartner Research, Technical report: An Estimate of Infringing Use of the Internet. Envisional, Abdelberi, C. et al., Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. NSS Jansen, R., Johnson, A., and Syverson, P., LIRA: Lightweight Incentivized Routing for Anonymity. NDSS, Boucher, P., Shostack, A., and Goldberg, I., Freedom Systems 2.0 Architecture by Zero Knowledge Systems, Inc. White Paper, 2000.