Wednesday, October 3, 2007

Anonymous network operation _ General

Here's the basic idea of anonymous network operation. Let's say, A wants to deliver the information to B. To stay anonymous, A let a delivery service X to deliver the information to B. X receives the information from A and delivers to B. However, X is not a simple trusted third party. X provides specific set of services that can protect anonymity. The anonymous networking system is equal to X.

In late 90s and early 2000, there were lots of research and effort to set up anonymous network. Some of them still exists and operate, and some of them are forced to stop their service. In this research, I looked into how these services operated to protect the leak of information. Even though the basic idea of operation is same, each networks are designed in different way.


I am also trying to find out who are using these network, and who are their adversary in more global scale. I am not sure how much of this information can be extracted.

No comments: