upcarta
  • Sign In
  • Sign Up
  • Explore
  • Search

Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems

  • Paper
  • #Computersecurity #Internet
Adam Back
@adam3us
(Author)
Anton Stiglic
@antonstiglic
(Author)
www.cypherspace.org
Read on www.cypherspace.org
1 Recommender
1 Mention
We discuss problems and trade-offs with systems providing anonymity for web browsing (or more generally any communication system that requireslow latency interaction). We focus on... Show More

We discuss problems and trade-offs with systems providing anonymity
for web browsing (or more generally any communication system that requireslow
latency interaction). We focus on two main systems: the Freedom network [12]
and PipeNet [8]. Although Freedom is efficient and reasonably secure against denial of service attacks, it is vulnerable to some generic traffic analysis attacks,
which we describe. On the other hand, we look at PipeNet, a simple theoretical
model which protects against the traffic analysis attacks we point out, but is vulnerable to denial of services attacks and has efficiency problems. In light of these
observations, we discuss the trade-offs that one faces when trying to construct an
efficient low latency communication system that protects users anonymity.

Show Less
Recommend
Post
Save
Complete
Collect
Mentions
See All
Olaoluwa Osuntokun @roasbeef ยท Apr 4, 2022
  • Post
  • From Twitter
I'm not saying it's impossible, but it's very hard in practice, and even harder to determine if things actually work, ofc it also depends on your threat model and adversary an old paper on the topic worth reading:
  • upcarta ©2025
  • Home
  • About
  • Terms
  • Privacy
  • Cookies
  • @upcarta