PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text...
Transcript of PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text...
![Page 1: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/1.jpg)
Slide title
In CAPITALS
50 pt
Slide subtitle
32 pt
Muhammad Rizwan Asghar
August 20, 2020
PRIVACY AND ANONYMITY
Lecture 11
COMPSCI 316
Cyber Security
Source of most slides: Northeastern University, USA
![Page 2: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/2.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
2
FOCUS OF THIS LECTURE
Understand privacy and anonymity
Discuss solutions that offer privacy and
anonymity
Learn attacks on privacy and anonymity
![Page 3: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/3.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
3
MOTIVATION FOR PRIVACY
People have the right to keep their personal
data private
– Right to privacy
Privacy also means not to reveal information
about who is communicating with whom
The use of online services can pose a threat to
our privacy!
– There is a possibility to link users’ actions
![Page 4: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/4.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
4
MOTIVATION FOR ANONYMITY
Hiding identities of communicating parties from
each other or from third parties
Anonymity is a tool to preserve privacy
For many applications, a user identity might
not be needed by the service provider
– E.g., web browsing
![Page 5: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/5.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
5
USE OF ANONYMITY
Free speech for political and other comments
Whistleblowers
Journalists
Human rights activists
Normal users for avoiding tracking
![Page 6: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/6.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
6
ABUSE OF ANONYMITY
Disclosure of trade secrets
DoS
Other illegal activities by cybercriminals
– Illegal downloads
E.g., copyright infringement
– Scams
– Hacking
![Page 7: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/7.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
7
ARE YOU ANONYMOUS
Your IP address can be linked directly to you
– ISPs store communications record
– Data retention laws
You are being tracked
– Cookies
– Browser fingerprinting
– Device fingerprinting
![Page 8: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/8.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
8
QUANTIFYING ANONYMITY
How can we calculate how anonymous we
are?
Who sent this
message?
Suspects (Anonymity Set)
![Page 9: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/9.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
9
QUANTIFYING ANONYMITY
A larger anonymity set means stronger
anonymity
Source: pixabay.com
![Page 10: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/10.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
10
SOME TERMS
Unlinkability
– The inability of linking two or more items of
interest
E.g., packets, events, people, actions, etc.
– Three aspects
Sender anonymity: who sent?
Receiver anonymity: who is the destination?
Relationship anonymity: who communicates with
whom?
Unobservability
– The items of interest are indistinguishable from all
other items
![Page 11: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/11.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
11
PUBLIC KEY CRYPTO: REVISIT
Safe to distribute the public key KP
– Can only decrypt with the private key KS
– Computationally infeasible to derive KS from KP
<KP, KS>
KP
KP
![Page 12: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/12.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
12
ENCRYPTED DATA TRAFFIC
Content is unobservable
– Due to encryption
Source and destination are
trivially linkable
– No anonymity
Data Traffic
![Page 13: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/13.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
13
ANONYMISING PROXIES
Proxy Server
Using trusted centralised servers
Hides IP address of users
Users are not anonymous to proxy servers
![Page 14: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/14.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
14
ANONYMISING PROXIES:
SENDER ANONYMITY
Proxy Server
Source is unknown
Destination is known
![Page 15: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/15.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
15
ANONYMISING PROXIES:
RECEIVER ANONYMITY
Proxy Server
Source is known
Destination is unknown
![Page 16: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/16.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
16
ANONYMISING PROXIES:
MALICIOUS PROXY SERVER
Proxy Server
No anonymity
![Page 17: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/17.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
17
ANONYMISING PROXIES:
TRAFFIC ANALYSIS
Proxy Server
Statistical analysis of traffic patterns can compromise
anonymity, i.e., timing and/or volume of packets
![Page 18: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/18.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
18
SAMPLE QUESTION
Which one of the following statements is FALSE?
a) Data encryption provides unobservability
b) Anonymous proxy offers unlinkability
c) Both a & b
d) Data encryption guarantees anonymity
![Page 19: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/19.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
19
SAMPLE QUESTION: ANSWER
Which one of the following statements is FALSE?
a) Data encryption provides unobservability
b) Anonymous proxy offers unlinkability
c) Both a & b
d) Data encryption guarantees anonymity
Answer) d
![Page 20: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/20.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
20
DATA TO PROTECT
Personally Identifiable Information (PII)
– Name, address, phone number, etc.
OS and browser information
– Cookies
IP address
Amount of data sent and received
Traffic timing
![Page 21: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/21.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
21
MIX NETWORKS
Use a chain of anonymous proxies
Each proxy is known as a Mix
A mix receives messages from a set of
senders, shuffle them, and send to another mix
Originally designed for anonymous email
![Page 22: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/22.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
22
MIX PROXIES AND ONION ROUTING
Mixes form a cascade of anonymous proxies
Traffic is protected with layers of encryption
Mix
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>[KP , KP , KP]
Encrypted
Tunnels
Non-encrypted
data
E(KP , E(KP , E(KP , M))) = C
![Page 23: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/23.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
23
ENCRYPTED PATH: ANOTHER VIEW
<KP, KS> <KP, KS> <KP, KS>
![Page 24: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/24.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
24
RETURN TRAFFIC
In a mix network, how can the destination respond to
the sender?
During path establishment, the sender places keys at
each mix along the path
– Data is re-encrypted as it travels the reverse path
<KP1 , KS1>
<KP2 , KS2>
<KP3 , KS3>
KP1 KP2KP3
![Page 25: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/25.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
25
TO BE CONTINUED
See the next lecture
![Page 26: PRIVACY AND ANONYMITY Lecture 11€¦ · for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5 20 pt 4 MOTIVATION FOR ANONYMITY Hiding identities of communicating parties](https://reader035.fdocuments.us/reader035/viewer/2022071016/5fcf51d0362eb2152444183a/html5/thumbnails/26.jpg)
Top right
corner for
field
customer or
partner logotypes.
See Best practice
for example.
Slide title
40 pt
Slide subtitle
24 pt
Text
24 pt
5
20 pt
26
Questions?
Thanks for your attention!