[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #18361 [Tor Browser]: Issues with corporate censorship and mass surveillance
#18361: Issues with corporate censorship and mass surveillance
------------------------------------------+--------------------------
Reporter: ioerror | Owner: tbb-team
Type: enhancement | Status: new
Priority: High | Milestone:
Component: Tor Browser | Version:
Severity: Critical | Resolution:
Keywords: security, privacy, anonymity | Actual Points:
Parent ID: | Points:
Sponsor: |
------------------------------------------+--------------------------
Changes (by yawning):
* cc: isis (added)
Comment:
cc-ing isis since this covers earlier work.
Replying to [comment:1 marek]:
> Disclaimer: I work for CloudFlare. Disclaimer: Comments here are
opinions of myself, not my employer.
>
> I will restrain myself and not comment on the political issues Jacob
raised. I'll keep it technical.
>
> > I would like to find a solution with Cloudflare - but I'm unclear that
the correct answer is to create a single cookie that is shared across all
sessions - this effectively links all browsing for the web.
>
> A thousand times yes. I raised this option a couple times (supercookie)
and we agreed this is a bad idea. I believe there is a cryptographic
solution to this. I'm not a crypto expert, so I'll allow others to explain
this. Let's define a problem:
>
> > There are CDN/DDoS companies in the internet that provide spam
protection for their customers. To do this they use captchas to prove that
the visitor is a human. Some companies provide protection to many
websites, therefore visitor from abusive IP address will need to solve
captcha on each and all domains protected. Let's assume the CDN/DDoS don't
want to be able to correlate users visiting multiple domains. Is it
possible to prove that a visitor is indeed human, once, but not allow the
CDN/DDoS company to deanonymize / correlate the traffic across many
domains?
>
> In other words: is it possible to provide a bit of data (i'm-a-human)
tied to the browsing session while not violating anonymity.
Yes. This is a problem that "Anonymous Credential" systems are designed
to solve. A example of a system with most of the properties that are
desired is presented in Au, M. H., Kapadia, A., Susilo, W., "BLACR: TTP-
Free Blacklistable Anonymous Credentials with Reputation"
(https://www.cs.indiana.edu/~kapadia/papers/blacr-ndss-draft.pdf). Note
that this is still an active research area, and BLACR it of itself may not
be practical/feasible to implement, and is listed only as an example since
the paper gives a good overview of the problem and how this kind of
primitive can be used to solve the problem.
Isis can go into more details on this sort of thing, since she was trying
to implement a similar thing based on Mozilla Persona (aborted attempt due
to Mozilla Persona being crap).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18361#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs