Bridging the gap between anonymous e‐mail and anonymous web browsing
نویسندگان
چکیده
منابع مشابه
Bridging the gap between anonymous e-mail and anonymous web browsing
Purpose – Anonymity research on high latency, store-and-forward mediums, such as e-mail, have led to comparatively well-researched anonymity technologies; however, similar achievements have proven to be more difficult for low-latency communications such as Web browsing. This paper aims to propose an anonymous Web browsing protocol that harnesses some of the advantages of a store-and-forward ano...
متن کاملHow to Make Personalized Web Browsing Simple Secure and Anonymous
An increasing number of web sites require users to establish an account before they can access the information stored on that site personalized web browsing Typically the user is required to provide at least a unique username a secret password and an e mail address Establishing accounts at multiple web sites is a tedious task A security and privacy aware user may have to invent a distinct usern...
متن کاملgap - Practical Anonymous Networking
This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based ...
متن کاملPseudo An Anonymous Email Relay Server
Modern secure email protocol relies on PGP encryption to ensure privacy. However, while PGP can confirm message body authenticity and privacy, it fails to provide anonymity. This is because it leaves all identifying headers of an email such as IP and email addresses in plain text. As a result, users are often left vulnerable when communicating with compromised machines. We propose Pseudo, an SM...
متن کاملAttacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics
The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend against traffic analysis attacks. However, the vulnerability of the connections between end users and the anonymous network do not attract any attention yet. For the first time, we reveal an end user browsing dynamics based attack on anonymous browsing systems at the LAN wh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Online Information Review
سال: 2008
ISSN: 1468-4527
DOI: 10.1108/14684520810865967