SlideShare ist ein Scribd-Unternehmen logo
1 von 69
Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol DEFCON 16 Presentation Magnus Bråding 2008
Short Author Presentation ,[object Object],[object Object]
10+ years in the security business
Central contributor and driving force behind w oodmann.com reverse engineering community
Project Background (why is this interesting?) ,[object Object],[object Object]
Private organizations tracking users and sites by misc illegal means
ISPs tracking and throttling arbitrary traffic
Data retention laws
Wiretapping laws (FISA / FRA)
Draconian laws for tracking and punishing P2P users ,[object Object]
ISPs being forced to police the traffic of their users ,[object Object]
Dictatorships and other regimes with oppressed people censoring and tracking Internet use on an increasingly larger scale
Recent EU law proposal to register, track and regulate all bloggers!
Project Background (why is this interesting?) ,[object Object]
Existing anonymization solutions are in many ways not well suited for this upcoming demand and the circumstances surrounding it
There is no real “standard” for anonymization, like BitTorrent is for P2P
A perfect opportunity to get it right with a new solution, from the start!
Goals of the Project ,[object Object]
To inspire further discussion about the optimal requirements for the future anonymization demand
To be a starting point and inspiration for the design and development of a global de facto standard for generic anonymization
Not  to be a complete detailed specification ready to be implemented, but rather to be built upon
Limitations ,[object Object],[object Object]
The protocol also contains built-in countermeasures to protect against attackers that are only able to monitor  parts  of the network
Further Assumptions and Directives ,[object Object]
CPU power, network bandwidth, working memory and secondary storage resources are all relatively cheap, and will all be available in ever increasing quantity during coming years and thereafter ,[object Object]
Limitations of This Presentation ,[object Object]
Much more details in the white paper ,[object Object]
Design Goals
Design Goal Overview ,[object Object]
The design goals are stipulated with the requirements and demand of today and the future in mind
Design Goal Overview ,[object Object],[object Object]
Maximum DoS resistance
Theoretically secure anonymization
Theoretically secure end-to-end encryption
Complete isolation from the ”normal” Internet
Protection against protocol identification
High Traffic Volume and Throughput Capability
Generic, Well-Abstracted and Backward Compatible
Design Goal #1: Complete Decentralization ,[object Object],[object Object]
Technically (DoS attacks, takedowns etc) ,[object Object],[object Object]
Design Goal #2: Maximum DoS Resistance ,[object Object]
It only takes one weakness, so defensive thinking must be applied throughout all levels of the design
Design Goal #3: Theoretically Secure Anonymization ,[object Object]
No security by obscurity
All anonymization aspects should be able to be expressed as a risk probability or a theoretical (cryptographic) proof
Design Goal #4: Theoretically Secure End-to-End Encryption ,[object Object],[object Object],[object Object]
Design Goal #5: Isolation from the "Normal" Internet ,[object Object]
An isolated network is necessary to be able to enforce end-to-end encryption for generic traffic
Using an isolated network has many advantages, but not so many disadvantages in the end
Out-proxies to the ”normal” Internet can still be implemented on the application level, selectively
Design Goal #6: Protection against Protocol Identification ,[object Object]
The harder it is made to positively identify the usage of the protocol, the harder it will be to track, throttle and block it
Design Goal #7: High Volume / Throughput Capacity ,[object Object]
More or less high speed / throughput is necessary for many Internet applications
Popularity will be proportionally related to transfer speed and volume
Anonymity is directly related to popularity
[object Object]
A well-abstracted system allows for efficient, distributed design and implementation
A system compatible with all pre-existing network enabled applications will get a much quicker takeoff and community penetration, and will have a  much  larger potential Design Goal #8: Generic, Well-Abstracted and Backward Compatible
A Bird’s-Eye View
The Basic Idea ! IP address of  α   = 5.6.7.8 ! IP address of  β   = 1.2.3.4 ? IP address of  β   = ??????? ? IP address of  α   = ??????? β α
More About the Idea Each anonymized node prepares its own ”routing path”, which is a series of nodes ready to route connections and data for it If two anonymized nodes want to communicate, it is done by creating an interconnection between their individual routing paths α β
Routing Paths Each anonymized node decide the size and composition of their own routing paths, affecting both the strength of anonymity provided by them, and their maximum throughput capacity β α
High Level Design
Routing Path - Generalization Anonymized node Intermediate node Arbitrarily many more intermediate nodes Terminating intermediate node α
Routing Tunnels Anonymized node Intermediate node Arbitrarily many more intermediate nodes Terminating intermediate node Whenever the anonymized node wants to establish a connection to another node, a ”routing tunnel” is set up inside the already existing routing path Such a routing tunnel is set up relatively quick, and will then be connected to another routing tunnel inside another routing path, to form a complete anonymized connection α
Routing Tunnels Anonymized node Intermediate node Arbitrarily many more intermediate nodes Terminating intermediate node Such a routing tunnel is set up relatively quick, and will then be connected to another routing tunnel inside another routing path, to form a complete anonymized connection α β
AP Addresses ,[object Object]
Equivalent to IP addresses in their format

Weitere ähnliche Inhalte

Was ist angesagt?

The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244
Tom King
 

Was ist angesagt? (19)

Wireless network security
Wireless network securityWireless network security
Wireless network security
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
 
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244
 
G011123539
G011123539G011123539
G011123539
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Botnets' networks
Botnets' networksBotnets' networks
Botnets' networks
 
Overview of WLAN security functions (ENG)
Overview of WLAN security functions (ENG)Overview of WLAN security functions (ENG)
Overview of WLAN security functions (ENG)
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS Protocol
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network security
 

Andere mochten auch (9)

Féerie de Noel
Féerie de NoelFéerie de Noel
Féerie de Noel
 
Rita Monti Microsite
Rita Monti MicrositeRita Monti Microsite
Rita Monti Microsite
 
Queens community district_2
Queens community district_2Queens community district_2
Queens community district_2
 
Final Border Crossing Sept09
Final Border Crossing Sept09Final Border Crossing Sept09
Final Border Crossing Sept09
 
8.2 - planning project activities
8.2 - planning project activities8.2 - planning project activities
8.2 - planning project activities
 
Neige Nanako Ryeoyoung
Neige Nanako RyeoyoungNeige Nanako Ryeoyoung
Neige Nanako Ryeoyoung
 
Internet marketing recommendation3
Internet marketing recommendation3Internet marketing recommendation3
Internet marketing recommendation3
 
Marketing chapter 1 with video
Marketing chapter 1 with videoMarketing chapter 1 with video
Marketing chapter 1 with video
 
Selling your Soul: Turning your entrepreneurial spirit intoa powerful brand.
Selling your Soul: Turning your entrepreneurial spirit intoa powerful brand.Selling your Soul: Turning your entrepreneurial spirit intoa powerful brand.
Selling your Soul: Turning your entrepreneurial spirit intoa powerful brand.
 

Ähnlich wie The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity

Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)
Mumbai Academisc
 
Web Technology Management Lecture II
Web Technology Management Lecture IIWeb Technology Management Lecture II
Web Technology Management Lecture II
sopekmir
 
Kudler Fine Foods Network Analysis
Kudler Fine Foods Network AnalysisKudler Fine Foods Network Analysis
Kudler Fine Foods Network Analysis
Kristen Stacey
 

Ähnlich wie The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity (20)

Network Project Report
Network Project ReportNetwork Project Report
Network Project Report
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Day4
Day4Day4
Day4
 
Pervasive nation
Pervasive nationPervasive nation
Pervasive nation
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Firewall
FirewallFirewall
Firewall
 
Hop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networksHop by-hop authentication and source privacy in wireless sensor networks
Hop by-hop authentication and source privacy in wireless sensor networks
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)
 
Web Technology Management Lecture II
Web Technology Management Lecture IIWeb Technology Management Lecture II
Web Technology Management Lecture II
 
Networks
NetworksNetworks
Networks
 
Kudler Fine Foods Network Analysis
Kudler Fine Foods Network AnalysisKudler Fine Foods Network Analysis
Kudler Fine Foods Network Analysis
 
Blockchain for good
Blockchain for goodBlockchain for good
Blockchain for good
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity

  • 1. Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol DEFCON 16 Presentation Magnus Bråding 2008
  • 2.
  • 3. 10+ years in the security business
  • 4. Central contributor and driving force behind w oodmann.com reverse engineering community
  • 5.
  • 6. Private organizations tracking users and sites by misc illegal means
  • 7. ISPs tracking and throttling arbitrary traffic
  • 10.
  • 11.
  • 12. Dictatorships and other regimes with oppressed people censoring and tracking Internet use on an increasingly larger scale
  • 13. Recent EU law proposal to register, track and regulate all bloggers!
  • 14.
  • 15. Existing anonymization solutions are in many ways not well suited for this upcoming demand and the circumstances surrounding it
  • 16. There is no real “standard” for anonymization, like BitTorrent is for P2P
  • 17. A perfect opportunity to get it right with a new solution, from the start!
  • 18.
  • 19. To inspire further discussion about the optimal requirements for the future anonymization demand
  • 20. To be a starting point and inspiration for the design and development of a global de facto standard for generic anonymization
  • 21. Not to be a complete detailed specification ready to be implemented, but rather to be built upon
  • 22.
  • 23. The protocol also contains built-in countermeasures to protect against attackers that are only able to monitor parts of the network
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30. The design goals are stipulated with the requirements and demand of today and the future in mind
  • 31.
  • 35. Complete isolation from the ”normal” Internet
  • 36. Protection against protocol identification
  • 37. High Traffic Volume and Throughput Capability
  • 38. Generic, Well-Abstracted and Backward Compatible
  • 39.
  • 40.
  • 41.
  • 42. It only takes one weakness, so defensive thinking must be applied throughout all levels of the design
  • 43.
  • 44. No security by obscurity
  • 45. All anonymization aspects should be able to be expressed as a risk probability or a theoretical (cryptographic) proof
  • 46.
  • 47.
  • 48. An isolated network is necessary to be able to enforce end-to-end encryption for generic traffic
  • 49. Using an isolated network has many advantages, but not so many disadvantages in the end
  • 50. Out-proxies to the ”normal” Internet can still be implemented on the application level, selectively
  • 51.
  • 52. The harder it is made to positively identify the usage of the protocol, the harder it will be to track, throttle and block it
  • 53.
  • 54. More or less high speed / throughput is necessary for many Internet applications
  • 55. Popularity will be proportionally related to transfer speed and volume
  • 56. Anonymity is directly related to popularity
  • 57.
  • 58. A well-abstracted system allows for efficient, distributed design and implementation
  • 59. A system compatible with all pre-existing network enabled applications will get a much quicker takeoff and community penetration, and will have a much larger potential Design Goal #8: Generic, Well-Abstracted and Backward Compatible
  • 61. The Basic Idea ! IP address of α = 5.6.7.8 ! IP address of β = 1.2.3.4 ? IP address of β = ??????? ? IP address of α = ??????? β α
  • 62. More About the Idea Each anonymized node prepares its own ”routing path”, which is a series of nodes ready to route connections and data for it If two anonymized nodes want to communicate, it is done by creating an interconnection between their individual routing paths α β
  • 63. Routing Paths Each anonymized node decide the size and composition of their own routing paths, affecting both the strength of anonymity provided by them, and their maximum throughput capacity β α
  • 65. Routing Path - Generalization Anonymized node Intermediate node Arbitrarily many more intermediate nodes Terminating intermediate node α
  • 66. Routing Tunnels Anonymized node Intermediate node Arbitrarily many more intermediate nodes Terminating intermediate node Whenever the anonymized node wants to establish a connection to another node, a ”routing tunnel” is set up inside the already existing routing path Such a routing tunnel is set up relatively quick, and will then be connected to another routing tunnel inside another routing path, to form a complete anonymized connection α
  • 67. Routing Tunnels Anonymized node Intermediate node Arbitrarily many more intermediate nodes Terminating intermediate node Such a routing tunnel is set up relatively quick, and will then be connected to another routing tunnel inside another routing path, to form a complete anonymized connection α β
  • 68.
  • 69. Equivalent to IP addresses in their format
  • 70. Equivalent to IP addresses in functionality, with the exception that they allow communication between two peers without automatically revealing their identity
  • 71. Backward compatible with IP applications
  • 72.
  • 73.
  • 74. Automatic resilience to constantly disappearing and newly joining nodes
  • 75.
  • 77.
  • 78. A Y-node should be located in one end of the sequence
  • 79. A number of Y-nodes equal to the total number of X-nodes minus one, should be located adjacent to each other in the other end of the sequence
  • 80. One end of the sequence should be chosen at random to be the beginning of the sequence X X X Y Y Y Y Y Y 2 Y 4 Y 1 Y 8 X 5 X 7 X 3 Y 6 α
  • 81. Secure Routing Path Establishment A ”goodie box” is prepared for each node, by the anonymized node Y 1 Y 2 X 3 Y 4 X 5 Y 6 X 7 Y 8 α
  • 82. Secure Routing Path Establishment Another round is started, with a new goodie box for each participating node Y 1 Y 2 X 3 Y 4 X 5 Y 6 X 7 Y 8 X 3 X 5 X 7 α
  • 83. Secure Routing Path Establishment Repeat The routing path is now securely established! α
  • 84.
  • 85. Secure Routing Tunnel Establishment (outbound) = = The anonymized node wants to establish a connection to a certain AP address It begins by sending a notification package through the routing path α
  • 86. Secure Routing Tunnel Establishment (outbound) = = ! A new set of connections are created for the tunnel, and a reply package is sent through these The reply package enables the anonymized node to derive the keys of all the intermediary nodes, while it is impossible for any of them to derive any key with it themselves α
  • 87. Secure Routing Tunnel Establishment (outbound) The anonymized node informs the exit node of the desired AP address to connect to The exit node performs the connection, and confirms a successful connection back to the anonymized node α
  • 88. Secure Routing Tunnel Establishment (outbound) Repeat The connection is fully established at both ends, and the application layer can now start communicating over it! α
  • 89. Secure Routing Tunnel Establishment (inbound) = = = ! An incoming connection request arrives to the entry node of the routing path The entry node sends an initialization package to the anonymized node The initialization package enables the anonymized node to immediately derive the keys of all the intermediary nodes, while it is impossible for any of them to derive any key with it themselves α β
  • 90. Secure Routing Tunnel Establishment (inbound) = = = A new set of connections are created for the tunnel, and a reply package is sent through these The entry node confirms the connection to the external peer α β
  • 91. Secure Routing Tunnel Establishment (inbound) It then confirms a successful connection back to the anonymized node α β
  • 92. Secure Routing Tunnel Establishment (inbound) Repeat The connection is now fully established at both ends, and the application layer can start communicating over it! To achieve symmetry with outbound connections though, a dummy package is first sent over the tunnel This symmetry is important! α β
  • 93.
  • 94. The used certificates can be stored in the network database, in the individual entries for each AP address
  • 95.
  • 97.
  • 98. No need for any application source code
  • 99.
  • 100. Simple to start supporting IPv6 and similar too
  • 101.
  • 102.
  • 103. Voting algorithms, digital signatures and enforced entry expiry dates are used on top of the standard DHT technology in some cases, to help enforce permissions and protect from malicious manipulation of database contents and query results
  • 104. Resilient to ”net splits”
  • 105.
  • 106. Restoration after possible more or less successful DoS attacks
  • 107.
  • 108. Commands signed by trusted party, e.g. project maintainers etc
  • 109.
  • 110.
  • 113.
  • 114. Lawsuits based on people using a certain file sharing program / protocol
  • 115. Lawsuits against endpoints in anonymization networks
  • 116. Lawsuits against routers on the Internet?
  • 117. Lawsuits based on people using a generic anonymization protocol
  • 118. Lawsuits based on people using cryptography?
  • 119. Lawsuits based on people using the Internet?
  • 120.
  • 121.
  • 122.
  • 123.
  • 127. Complete isolation from the ”normal” Internet
  • 128. Protection against protocol identification
  • 129. High Traffic Volume and Throughput Capability
  • 130. Generic, Well-Abstracted and Backward Compatible
  • 131.
  • 132. Thus there are no single points of the network to attack, neither technically nor legally, in order to bring down any other parts of the network than those exact ones attacked
  • 133.
  • 134. Can always be improved though
  • 135. Must continue to be a constant area of concern and improvement for future development Review of Design Goal #2: Maximum DoS Resistance ( )
  • 136.
  • 137. All security is based on cryptography and randomness, never on obscurity or chance
  • 138. Hopefully no gaping holes have been left to chance, but review and improvements are of course needed, as always in security
  • 139.
  • 140. All connections are wrapped by SSL, so the protection from external eavesdroppers should under all circumstances be at least equivalent to that of SSL
  • 141.
  • 142. The network can therefore not be used to anonymously commit illegal acts against any computer that has not itself joined and exposed services to the anonymous network, and thus accepted the risks involved in anonymous communication for these services
  • 143.
  • 144. Thus, neither the port number nor any of the contents of the communication can be directly used to distinguish it from common secure web traffic
  • 145. There are of course practically always enough advanced traffic analysis methods to identify certain kinds of traffic, or at least distinguish traffic from a certain other kind of traffic, but if this is made hard enough, it will take up too much resources or produce too many false positives to be practically or commercially viable
  • 146.
  • 147. Intermediate nodes will never know if they are adjacent to the anonymized node in a path or not
  • 148. Thus, single point-to-point connections between two nodes on the anonymous network, without any intermediate nodes at all (or with very few such), can be used while still preserving a great measure of anonymity, and/or ”reasonable doubt”
  • 149.
  • 150. The protocol design is abstracted in a way that each individual level of the protocol can be exchanged or redesigned without the other parts being affected or having to be redesigned at the same time
  • 151. The protocol emulates / hooks all TCP network APIs, and can thus be externally applied to any application that uses common TCP communication Review of Design Goal #8: Generic, Well-Abstracted and Backward Compatible
  • 152.
  • 153. Compatible with all existing and future network enabled software, without any need for adaptations or upgrades
  • 155. No traffic volume limits
  • 156. Isolated from the ”normal” Internet
  • 158. Better prevents positive protocol identification
  • 159. Not vulnerable to ”DNS leak” attacks and similar
  • 160.
  • 163. Better prevents positive traffic analysis identification
  • 164.
  • 165. The generic nature of Phantom opens up infinitely much more potential than just binding the anonymization to a single application or usage area
  • 166.
  • 167. One very important detail is that it will be very hard for the attacker to conclusively know that its nodes actually constitute the entire path, since the last attacker controlled node will never be able to determine if it is actually communicating with the anonymized node itself, or with just yet another intermediate node in the routing path
  • 168. The algorithms for routing path node selection can be optimized to minimize the risk of such a successful attack
  • 169.
  • 170. Some anonymization protocols try to counter such attacks by delaying data and sending out junk data, but this goes against the high throughput design goal of Phantom
  • 171.
  • 172. Could be countered to some degree by micro delays and data chunk size reorganization in intermediate nodes, but very hard to defend against completely
  • 173. Again though, very hard for the attacker to conclusively know where in the path its nodes are located, since they will never be able to determine if they are communicating with another intermediate node or not, or even the direction of the path
  • 174.
  • 175.
  • 177. Wiki
  • 178. Blog
  • 179.
  • 180. The Phantom project aims to provide such a solution
  • 181.
  • 182. Providing examples of solutions for problems related to such a thing
  • 183. Inspiring discussions about the design of such a system
  • 184.
  • 185.
  • 186. Questions / Discussion If you come up with a question later on, feel free to ask me over a beer, or to contact me by email! [email_address]