Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster,...
-
date post
19-Dec-2015 -
Category
Documents
-
view
223 -
download
2
Transcript of Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster,...
![Page 1: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/1.jpg)
Presenting: Dafna Shahaf
![Page 2: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/2.jpg)
Infranet: Circumventing Web Censorship and Surveillance
Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger
![Page 3: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/3.jpg)
![Page 4: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/4.jpg)
+ IP, key
?
![Page 5: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/5.jpg)
+ IP, key
3. Hide( )
Challenge!2. Hide( BBC.com )
1. Tunnel
![Page 6: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/6.jpg)
Discussion (1)
• James Bond movie!– Response of U.S. Army?
• Human component: software distribution • Assumptions– Scope of possible attacks from the censor?– Censor does not want to affect normal users– Downsampling images?
![Page 7: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/7.jpg)
Discussion (2)
• Detecting responders by analyzing downstream traffic– Errors? See if hash changes?
• Other schemes– Random numbers in hyperlinks?
• Overhead seems significant– Requests adequately spaced
• Human factors– Altruism– Fear of punishment
![Page 8: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/8.jpg)
Improving Wireless Privacy with an Identifier-Free Link Layer Protocol
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall
![Page 9: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/9.jpg)
Problem
• Packets still carry header information– Cleartext – Can be used to identify and track users
• Solution: Slyfy– Use predetermined aliases – Encapsulating protocol
![Page 10: Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,](https://reader035.fdocuments.us/reader035/viewer/2022062320/56649d2d5503460f94a03aab/html5/thumbnails/10.jpg)
Discussion
• Surprise• Deployment:
– Different encryption mechanism– Cold start
• Large reduction in throughput – De-emphasized, deal breaker
• Wireless– Who does the sender trust?
• Mechanism for distributing symmetric keys reveals too much?– Solved(?)