Publius: A robust, tamper-evident, censorship-resistant web publishing system

نویسندگان

  • Marc Waldman
  • Aviel D. Rubin
  • Lorrie Faith Cranor
چکیده

We describe a system that we have designed and implemented for publishing content on the web. Our publishing scheme has the property that it is very difficult for any adversary to censor or modify the content. In addition, the identity of the publisher is protected once the content is posted. Our system differs from others in that we provide tools for updating or deleting the published content, and users can browse the content in the normal point and click manner using a standard web browser and a client-side proxy that we provide. All of our code is freely available.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fault-tolerant Distributed Information Retrieval For Supporting Publius Servers and Mobile Peers

We show how dividing a database and replicating documents and indicies in an overlapping manner provides resilience in the face of node failures, malicious attacks, censorship attempts, and network partitions. This property of fault tolerance is beneficial for a wide range of scenarios, and we examine it in the context of two applications: an IR collection distributed over a set of mobile peers...

متن کامل

Poster: Incentivized Censorship Resistance with Payment Contracts

We propose Lavinia, a censorship resistant publishing system that incentivizes document storage through the use of an anonymous, distributed, time-locked payment system. This has the advantage of allowing the publisher to decide whether a document is worth storing, and for how long, instead of relying on public interest or an appointed editorial board. We give a description of related work in c...

متن کامل

Dagster: Censorship-Resistant Publishing Without Replication

In this paper we present Dagster, a new censorship-resistant publishing scheme. Unlike previous censorship-resistant schemes, Dagster does not rely on the widespread replication of data and can even be used in a single server setting. It accomplishes this by “intertwining” legitimate and illegitimate data, so that a censor can not remove objectionable content without simultaneously removing leg...

متن کامل

The aegis Processor Architecture for Tamper-Evident and Tamper-Resistant Processing

We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...

متن کامل

A Theory of Integrating Tamper Evidence with Stabilization

We propose the notion of tamper-evident stabilization –that combines stabilization with the concept of tamper evidence– for computing systems. On the first glance, these notions are contradictory; stabilization requires that eventually the system functionality is fully restored whereas tamper evidence requires that the system functionality is permanently degraded in the event of tampering. Tamp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000