New untraceable text-messaging system comes with statistical guarantees.
Anonymity networks, which sit on top of the public Internet, are designed to conceal people’s Web-browsing habits from prying eyes. The most popular of these, Tor, has been around for more than a decade and is used by millions of people every day.
Recent research, however, has shown that adversaries can infer a great deal about the sources of supposedly anonymous communications by monitoring data traffic through just a few well-chosen nodes in an anonymity network. At the Association for Computing Machinery Symposium on Operating Systems Principles in October, a team of MIT researchers presented a new, untraceable text-messaging system designed to thwart even the most powerful of adversaries.
The system provides a strong mathematical guarantee of user anonymity, while, according to experimental results, permitting the exchange of text messages once a minute or so.
“Tor operates under the assumption that there’s not a global adversary that’s paying attention to every single link in the world,” says Nickolai Zeldovich, an associate professor of computer science and engineering, whose group developed the new system. “Maybe these days this is not as good of an assumption. Tor also assumes that no single bad guy controls a large number of nodes in their system. We’re also now thinking, maybe there are people who can compromise half of your servers.”
Because the system confuses adversaries by drowning telltale traffic patterns in spurious information, or “noise,” its creators have dubbed it “Vuvuzela,” after the noisemakers favored by soccer fans at the 2010 World Cup in South Africa.
Joining Zeldovich on the paper are joint first authors David Lazar, a PhD student in electrical engineering and computer science, and Jelle van den Hoof, who received his MIT master’s in the spring, and Matei Zaharia, an assistant professor of computer science and engineering and, like Zeldovich, one of the co-leaders of the Parallel and Distributed Operating Systems group at MIT’s Computer Science and Artificial Intelligence Laboratory.
Covering your tracks
Vuvuzela is a dead-drop system, in which one user leaves a message for another at a predefined location — in this case, a memory address on an Internet-connected server — and the other user retrieves it. But it adds several layers of obfuscation to cover the users’ trails.
To illustrate how the system works, Lazar describes a simplified scenario in which it has only three users, named, by cryptographic convention, Alice, Bob, and Charlie. Alice and Bob wish to exchange text messages, but they don’t want anyone to be able to infer that they’ve been in touch.
If Alice and Bob send messages to the dead-drop server, and Charlie doesn’t, then an observer would conclude that Alice and Bob are communicating. So the system’s first requirement is that all users send regular messages to the server, whether they contain any information or not.
If an adversary has infiltrated the server, however, he or she can see which users are accessing which memory addresses. If Charlie’s message is routed to one address, but both Alice’s and Bob’s messages are routed to another, the adversary, again, knows who’s been talking.
So instead of using a single server, Vuvuzela uses three. Corresponding to the three servers, every message sent through the system is wrapped in three layers of encryption. The first server peels off the first layer of encryption before passing messages on to the second server. But it also randomly permutes their order. So if, for example, Alice’s message arrived at the first server before Bob’s, and Bob’s arrived before Charlie’s, the first server will pass them to the second in the order Bob, Alice, Charlie, or Charlie, Bob, Alice, or the like.
The second server peels off the second layer of encryption and permutes the message order yet again. Only the third server sees which messages are bound for which memory addresses. But even if it’s been infiltrated, and even if the adversary observed the order in which the messages arrived at the first server, he or she can’t tell whose message ended up where.
The adversary does, however, know that two users whose messages reached the first server within some window of time have been talking. And even that is more information than Vuvuzela’s designers want to give away.
Here’s where the noise comes in: When the first server passes on the messages it’s received, it also manufactures a slew of dummy messages, with their own encrypted destinations. The second server does the same. So statistically, it’s almost impossible for the adversary to determine even whether any of the messages arriving within the same time window ended up at the same destination.
Those statistical guarantees hold even if two of the three servers are infiltrated. As long as one of them remains uncompromised, the system works.
Read more: Untraceable communication — guaranteed
The Latest on: Untraceable communication
via Google News
The Latest on: Untraceable communication
- Oklahoma Avenue thrives despite mysterious historyon September 30, 2019 at 2:04 am
WASHINGTON –– Oklahoma Avenue, a diagonal, two-block-long residential street that sits two miles east of Capitol Hill, is one of the 50 state-named avenues in Washington, D.C., but it has an ...
- CrypoCurrencyWire Recaps Untraceable’s Futurist Conference and the Future World within a Conference - Planit NOWon August 30, 2019 at 6:35 am
The Untraceable team brings experiential and disruptive technologies ... (5) a full array of corporate communications solutions, and (6) a total news coverage solution with CCW Prime. As a ...
- CrypoCurrencyWire Recaps Untraceable’s Futurist Conference and the Future World within a Conference - Planit NOWon August 29, 2019 at 5:00 pm
The Untraceable team successfully implemented cryptocurrencies ... really made an impact,” said Jonathan Keim, communications director of CryptoCurrencyWire. “There was something for everyone, ...
- Few takers for NavIC setson July 21, 2019 at 4:47 pm
Last week’s incident where four fishermen from the district remained untraceable for nearly three days has yet again underlined the need for an easy-to-use, two-way communication facility for deep-sea ...
- South Africa’s “untraceable” spam mail CEOon July 12, 2019 at 5:48 am
Joren Communications is described as a digital agency focused ... (then called Goofrica), he went to great lengths to contact Mushipe, who he described as “untraceable”. “I then tried finding Mr ...
- Address unknown: Postcards designed for missing personson December 12, 2018 at 12:38 am
safe in the knowledge that the communication is untraceable," she said. Founder of Leave A Light On, Suzie Ratcliffe. Her 11-year-old sister went missing in 1973. Credit:Jamila Toderas However, the ...
- Bringing Dark Money to a Gunfight: The NRA and Other Groups Are Increasingly Using Untraceable Dollars to Influence Our Electionson July 18, 2018 at 10:00 pm
An FBI affidavit supporting the complaint quoted an unnamed American saying that he helped secure “a VERY private line of communication between the Kremlin” and Republican Party leaders. He added that ...
- LeT uses untraceable phones, runs underground training camps, reveals held terroriston May 23, 2018 at 7:39 am
New Delhi: Student wing of the Lashkar-e-Taiba, Al Muhammadia Students (AMS), has developed an untraceable mobile handset meant exclusively for communication among ...
- LeT Members Communicate Through Untraceable Mobile Phones, Claims Captured Terroriston May 22, 2018 at 8:55 pm
New Delhi, May 23: The student wing of Hafiz Saeed-led Lashkar-e-Taiba (LeT) has developed a mobile handset which enables communication between its members, a 20-year-old Multan-based LeT terrorist ...
- LETTER: Untraceable hacking skills works in Trump’s favoron July 28, 2017 at 5:03 am
LETTER: Untraceable hacking skills works in Trump’s favor On Tuesday, the newly appointed White House communications director, Anthony Scaramucci, told CNN that Donald Trump called him from Air Force ...
via Bing News