Next: Related Work
Up: Attacks on Free Haven
Previous: Attacks on the Trust
There are a number of attacks which might be used to determine more
information about the identity of some entity in the system.
- Attacks on reader anonymity:
- An adversary might develop and
publish on Free Haven a customized virus which automatically contacts a
given host upon execution. A special case of this attack would be to
include mime-encoded URLs in a document to exploit reader software which
automatically loads URLs. Another approach might be to become a node on
both the servnet and the mixnet, and attempt an end-to-end attack, such
as correlating message timing with document requests. Indeed, servers
could claim to have a document and see who requests it, or simply
monitor queries and record the source of each query. Sophisticated
servers might attempt to correlate readers based on the material they
download, and then try to build statistical profiles and match them to
people (outside Free Haven) based on activity and preferences;
we prevent this attack by using each reply block for only one
transaction.
- Attacks on server anonymity:
- Adversaries might create unusually
large shares, and try to reduce the set of known servers who might have
the capacity to store such shares. This attacks the partial anonymity of
these servers. An adversary could become a servnet node, and then
collect routine status and participation information (such as server
lists) from other nodes. This information might be extended with
extensive knowledge of the bandwidth characteristics and limitations of
the Internet to map servnet topology. By joining the mixnet, an
adversary might correlate message timing with trade requests or trust
broadcasts. An alternate approach is simply to spread a Trojan Horse or
worm which looks for Free Haven servers and reports which shares they
are currently storing.
- Attacks on publisher anonymity:
- An adversary could become a server
and log publishing acts, and then attempt to correlate source or timing.
Alternatively, he might look at servers who might recently have
published a document, and try to determine who has been communicating
with them recently.
There are entirely social attacks which can be very successful, such as
offering a large sum of money for information leading to the current
location of a given document, server, reader, etc.
We avoid or reduce the threat of many of these attacks by using an anonymous channel
which supports pseudonyms for our communications. This prevents most or all adversaries from being
able to determine the source or destination of a given message, or
establish linkability between each endpoint of a set of messages. Even
if node administrators are subpoenaed or otherwise pressured to release
information about these entities, they can openly disclaim any
knowledge. Obviously, the level of anonymity provided by the
is based on its robustness to traffic analysis and similar attacks.
Next: Related Work
Up: Attacks on Free Haven
Previous: Attacks on the Trust
2000-07-08