34th Chaos Communication Congress

»How Alice and Bob meet if they don't like onions«
2017-12-29, 20:00–21:00, Saal Dijkstra

This history of anonymisation networks is long. Popular anonymisation networks rightfully focus on Web browsing, because that is the most popular application on todays Internet. The most popular anonymisation network is, rightfully so, Tor. You might, however, not have the requirements that mandate the use of the Tor network and thus are looking for alternatives. This talk presents a survey of anonymisation networks, what they achieve and how they differ.

With the popularity of the Web came the popularity of anonymisation networks catering for the Web context. That means in particular low latency. Generally though, anonymisation networks can be classified by different properties such as sender anonymity, receiver anonymity, bandwith overhead, or strength of anonymity.

In this talk we will decompose anonymisation networks into their building blocks and examine how they work together in order to be resiliant against deanonymisation attacks. We present alternative anonymisation communication networks which achieve different goals with different methods. In particular, we will look at JonDonym, Riffle, and Herbivore as concrete instantiations of mix-nets.

We will see that once you understand your requirements, you can engineer your anonymisation network's architecture according to your needs and get away with lower overhead in computation, latency, or bandwidth.