Skip to main content

2014 | OriginalPaper | Buchkapitel

Censorship Resistance as a Side-Effect

verfasst von : Henry Tan, Micah Sherr

Erschienen in: Security Protocols XXII

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This position paper presents the following thought experiment: can we build communication protocols that (1) are sufficiently useful that they achieve widespread adoption as general-purpose communication mechanisms and (2) thwart censorship as a consequence of their design? We posit that a useful communication platform that is inherently resistant to traffic analysis, if widely adopted and used primarily for purposes not related to censorship circumvention, may be too politically and economically costly for a government to block.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The use of the hash function provides some privacy protections, since it makes it more difficult to cull email addresses and network locations from the directory.
 
Literatur
1.
Zurück zum Zitat Andersen, D.G., Balakrishnan, H., Kaashoek, M.F., Morris, R.: The case for resilient overlay networks. In: Workshop on Hot Topics in Operating Systems (HotOS) (2001) Andersen, D.G., Balakrishnan, H., Kaashoek, M.F., Morris, R.: The case for resilient overlay networks. In: Workshop on Hot Topics in Operating Systems (HotOS) (2001)
2.
Zurück zum Zitat Burnett, S., Feamster, N., Vempala, S.: Chipping away at censorship firewalls with user-generated content. In: USENIX Security Symposium (USENIX) (2010) Burnett, S., Feamster, N., Vempala, S.: Chipping away at censorship firewalls with user-generated content. In: USENIX Security Symposium (USENIX) (2010)
3.
Zurück zum Zitat Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: USENIX Security Symposium (USENIX) (2004) Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: USENIX Security Symposium (USENIX) (2004)
4.
Zurück zum Zitat Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.: Infranet: circumventing web censorship and surveillance. In: USENIX Security Symposium (USENIX) (2002) Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.: Infranet: circumventing web censorship and surveillance. In: USENIX Security Symposium (USENIX) (2002)
5.
Zurück zum Zitat Gellman, B., Soltani, A.: NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say, The Washington Post, 30 October 2013 Gellman, B., Soltani, A.: NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say, The Washington Post, 30 October 2013
6.
Zurück zum Zitat Houmansadr, A., Riedl, T., Borisov, N., Singer, A.: I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. In: Network and Distributed System Security Symposium (NDSS) (2013) Houmansadr, A., Riedl, T., Borisov, N., Singer, A.: I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. In: Network and Distributed System Security Symposium (NDSS) (2013)
7.
Zurück zum Zitat Laurie, B., Langley, A., Kasper, E.: Certificate Transparency. RFC 6962, Internet Engineering Task Force (2013) Laurie, B., Langley, A., Kasper, E.: Certificate Transparency. RFC 6962, Internet Engineering Task Force (2013)
8.
Zurück zum Zitat Moghaddam, H.M., Li, B., Derakhshani, M., Goldberg, I.: SkypeMorph: protocol obfuscation for tor bridges. In: ACM Conference on Computer and Communications Security (CCS) (2012) Moghaddam, H.M., Li, B., Derakhshani, M., Goldberg, I.: SkypeMorph: protocol obfuscation for tor bridges. In: ACM Conference on Computer and Communications Security (CCS) (2012)
9.
Zurück zum Zitat Provos, N., Honeyman, P.: Detecting steganographic content on the internet. Technical report 01-11, Center for Information Technology Integration, University of Michigan (2001) Provos, N., Honeyman, P.: Detecting steganographic content on the internet. Technical report 01-11, Center for Information Technology Integration, University of Michigan (2001)
10.
Zurück zum Zitat Schuchard, M., Geddes, J., Thompson, C., Hopper, N.: Routing around decoys. In: ACM Conference on Computer and Communications Security (CCS) (2012) Schuchard, M., Geddes, J., Thompson, C., Hopper, N.: Routing around decoys. In: ACM Conference on Computer and Communications Security (CCS) (2012)
12.
Zurück zum Zitat Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) (2001) Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) (2001)
13.
Zurück zum Zitat Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, Oakland (1997) Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, Oakland (1997)
14.
Zurück zum Zitat White, A.M., Snow, K., Matthews, A., Monrose, F.: Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks. In: IEEE Symposium on Security and Privacy, Oakland (2011) White, A.M., Snow, K., Matthews, A., Monrose, F.: Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks. In: IEEE Symposium on Security and Privacy, Oakland (2011)
15.
Zurück zum Zitat Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted VoIP conversations. In: IEEE Symposium on Security and Privacy, Oakland (2008) Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted VoIP conversations. In: IEEE Symposium on Security and Privacy, Oakland (2008)
16.
Zurück zum Zitat Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In: USENIX Security Symposium (USENIX) (2007) Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In: USENIX Security Symposium (USENIX) (2007)
17.
Zurück zum Zitat Wustrow, E., Wolchok, S., Goldberg, I., Halderman, J.A.: Telex: anticensorship in the network infrastructure. In: USENIX Security Symposium (USENIX) (2011) Wustrow, E., Wolchok, S., Goldberg, I., Halderman, J.A.: Telex: anticensorship in the network infrastructure. In: USENIX Security Symposium (USENIX) (2011)
Metadaten
Titel
Censorship Resistance as a Side-Effect
verfasst von
Henry Tan
Micah Sherr
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-12400-1_21