[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #18361 [Tor Browser]: Issues with corporate censorship and mass surveillance
#18361: Issues with corporate censorship and mass surveillance
------------------------------------------+--------------------------
Reporter: ioerror | Owner: tbb-team
Type: enhancement | Status: new
Priority: High | Milestone:
Component: Tor Browser | Version:
Severity: Critical | Resolution:
Keywords: security, privacy, anonymity | Actual Points:
Parent ID: | Points:
Sponsor: |
------------------------------------------+--------------------------
Comment (by isis):
Replying to [comment:8 yawning]:
> cc-ing isis since this covers earlier work.
>
> Replying to [comment:1 marek]:
> > In other words: is it possible to provide a bit of data (i'm-a-human)
tied to the browsing session while not violating anonymity.
>
> Yes. This is a problem that "Anonymous Credential" systems are designed
to solve. A example of a system with most of the properties that are
desired is presented in Au, M. H., Kapadia, A., Susilo, W., "BLACR: TTP-
Free Blacklistable Anonymous Credentials with Reputation"
(https://www.cs.indiana.edu/~kapadia/papers/blacr-ndss-draft.pdf). Note
that this is still an active research area, and BLACR it of itself may not
be practical/feasible to implement, and is listed only as an example since
the paper gives a good overview of the problem and how this kind of
primitive can be used to solve the problem.
>
> Isis can go into more details on this sort of thing, since she was
trying to implement a similar thing based on Mozilla Persona (aborted
attempt due to Mozilla Persona being crap).
Having not read the BLACR paper yetâ one should generally be wary of
anonymous credentials which advertise some form of revocation, since
effectively what this means is having some backdoor whereby a trusted
third party can do "anonymity revocation". The other form this usually
takes is to keep a blacklist (skimming tells me that BLACR does this), or
keep some other form of state, e.g. "all blinded signature tokens we've
already seen used before," which additionally introduces the requirement
that the credential issuing server be always online.
There are other anonymous credential schemes built on NIZK proofs which do
not require keeping expensive (and continually growing) blacklists, one of
my personal favourites being described in
[https://eprint.iacr.org/2008/428 Belenkiy, Lysyanskaya, Camenisch,
Sacham, Chase, and Kohlweiss' "Randomizable Proofs and Delegatable
Anonymous Credentials"]. The delegation aspect could also provide a nice
feature of being able to e.g. say "I'll trust any user who has met the
authentication requirements of any of Cloudflare, Wikipedia, or Amazon"
without necessarily knowing which of those three the user had already
authenticated to.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18361#comment:31>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs