Publius: A robust, tamper-evident, censorship-resistant web publishing system
نویسندگان
چکیده
We describe a system that we have designed and implemented for publishing content on the web. Our publishing scheme has the property that it is very difficult for any adversary to censor or modify the content. In addition, the identity of the publisher is protected once the content is posted. Our system differs from others in that we provide tools for updating or deleting the published content, and users can browse the content in the normal point and click manner using a standard web browser and a client-side proxy that we provide. All of our code is freely available.
منابع مشابه
Fault-tolerant Distributed Information Retrieval For Supporting Publius Servers and Mobile Peers
We show how dividing a database and replicating documents and indicies in an overlapping manner provides resilience in the face of node failures, malicious attacks, censorship attempts, and network partitions. This property of fault tolerance is beneficial for a wide range of scenarios, and we examine it in the context of two applications: an IR collection distributed over a set of mobile peers...
متن کاملPoster: Incentivized Censorship Resistance with Payment Contracts
We propose Lavinia, a censorship resistant publishing system that incentivizes document storage through the use of an anonymous, distributed, time-locked payment system. This has the advantage of allowing the publisher to decide whether a document is worth storing, and for how long, instead of relying on public interest or an appointed editorial board. We give a description of related work in c...
متن کاملDagster: Censorship-Resistant Publishing Without Replication
In this paper we present Dagster, a new censorship-resistant publishing scheme. Unlike previous censorship-resistant schemes, Dagster does not rely on the widespread replication of data and can even be used in a single server setting. It accomplishes this by “intertwining” legitimate and illegitimate data, so that a censor can not remove objectionable content without simultaneously removing leg...
متن کاملThe aegis Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...
متن کاملA Theory of Integrating Tamper Evidence with Stabilization
We propose the notion of tamper-evident stabilization –that combines stabilization with the concept of tamper evidence– for computing systems. On the first glance, these notions are contradictory; stabilization requires that eventually the system functionality is fully restored whereas tamper evidence requires that the system functionality is permanently degraded in the event of tampering. Tamp...
متن کامل