| |
Current Topic: Miscellaneous |
|
RE: Thomas P.M. Barnett: The Worldchanging Interview |
|
|
Topic: Miscellaneous |
1:10 am EST, Dec 29, 2004 |
You can see a presentation of his at cspan.org http://www.cspan.org/search/basic.asp?ResultStart=1&ResultCount=10&BasicQueryText=Pentagon%27s+New+Map This is actually where I first saw him... k wrote: ] ] Prof. Thomas P.M. Barnett, Senior Strategic Researcher at ] ] the U.S. Naval War College, is maybe the hottest military ] ] thinker in the world right now. His work, which focuses ] ] on the connections between development and security, and ] ] in particular his book, The Pentagon's New Map: War and ] ] Peace in the Twenty-First Century, has become deeply ] ] influential with forward-thinking members of the ] ] military. RE: Thomas P.M. Barnett: The Worldchanging Interview |
|
RE: Onion Routing 2.0: tor |
|
|
Topic: Miscellaneous |
12:55 am EDT, Sep 8, 2004 |
Acidus wrote: ] ] The complex version: Onion Routing is a connection-oriented ] ] anonymizing communication service. Users choose a ] ] source-routed path through a set of nodes, and negotiate a ] ] "virtual circuit" through the network, in which each node ] ] knows its predecessor and successor, but no others. Traffic ] ] flowing down the circuit is unwrapped by a symmetric key at ] ] each node, which reveals the downstream node. ] ] What about traffic analysis? While I don't know much about ] this, I had a talk about this very same thing with Decius not ] too long ago. Don't you need some type of anonymous cloud ] takes and "holds" your request for some random length of time? ] That way if enough people are inject requests into the cloud, ] there is no way to match an incoming transmition cloud with ] one leaving the cloud. It's a performance tradeoff, and it is thought that even the typical padding and reordering is not sufficient. The design document has this to say: No mixing, padding, or traffic shaping (yet): Onion Routing originally called for batching and reordering cells as they arrived, assumed padding between ORs, and in later designs added padding between onion proxies (users) and ORs [27,41]. Tradeoffs between padding protection and cost were discussed, and traffic shaping algorithms were theorized [49] to provide good security without expensive padding, but no concrete padding scheme was suggested. Recent research [1] and deployment experience [4] suggest that this level of resource use is not practical or economical; and even full link padding is still vulnerable [33]. Thus, until we have a proven and convenient design for traffic shaping or low-latency mixing that improves anonymity against a realistic adversary, we leave these strategies out. They suggest (but dont say outright) that reordering & batching may occur at some point. It would certainly give me more warm fuzzies if it did. http://freehaven.net/tor/cvs/doc/design-paper/tor-design.html makes for an interesting read... RE: Onion Routing 2.0: tor |
|
Topic: Miscellaneous |
3:05 pm EDT, Sep 7, 2004 |
The simple version: Tor provides a distributed network of servers("onion routers"). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream. The complex version: Onion Routing is a connection-oriented anonymizing communication service. Users choose a source-routed path through a set of nodes, and negotiate a "virtual circuit" through the network, in which each node knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each node, which reveals the downstream node. http://freehaven.net/tor/ [main page] http://freehaven.net/tor/slides-codecon04/ [codecon slides] |
|