Anonymity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

What is a VPN?

a Virtual Private Network that establish a connection towards a (trusted) server and all your internet traffic is encrypted in this channel

2
New cards

What is OpenVPN?

Open source software for creating a VPN

3
New cards

What library does OpenVPN use?

It uses OpenSSL to deal with key exchange via SSL/TLS

4
New cards

What security protocol does OpenVPN follow?

A custom one based on TLS.

5
New cards

Can ports and protocols be changed with OpenVPN? Why ? Why not?

Yes for flexibility to avoid limitations

6
New cards

How do clients authenticate an OpenVPN server?

A certificate rather than a shared secret.

7
New cards

Why are VPNs useful?

Used to access sensitive service or data in a company from outside

Used to anonymize the traffic as the ISP (Internet Service Provider) will no longer know which websites you surf as it will only see a connection towards the VPN server

Used to simulate your current position to the one of the VPN server

Useful for banned website in specific Countries

Useful to access media content of another Country (like pay-per-view TV, etc…)

8
New cards

What is a different approach to anonymity other than VPNs?

Mix networks

9
New cards

What were mix networks originally designed for?

Anonymous email but have since been generalised for TCP traffic.

10
New cards

What influential ideas did mix networks bring about?

Onion routing

Traffic mixing

Dummy traffic (a.k.a. cover traffic)

11
New cards

How does onion routing protect anonymity?

Messages are encrypted in multiple layers, each removed by a proxy node in sequence, obscuring the sender and receiver.

12
New cards

How is return traffic handled in mix networks?

The sender pre-establishes keys along the return path; messages are re-encrypted in reverse.

13
New cards

What are the key components of the Tor network?

Guard (input) nodes - know the identity of sender

relay nodes - used to route messages (made up of advertised nodes and bridge nodes [those not listed in the directory server])

and exit nodes - can see traffic if unencrypted

14
New cards

What makes Tor different from basic mix networks?

It considers bandwidth for relay selection and includes hidden services.

15
New cards

What are Tor directory servers?

They store and manage the status of Tor nodes.

16
New cards

What are Tor hidden services?

Services accessible only within the Tor network, hiding both the client and server IP addresses as well as the servers DNS name.

17
New cards

How does a user connect to a hidden service in Tor?

Using an onion address, introduction points, and rendezvous points.

18
New cards

How is voter authentication done in Estonian e-voting?

Via an ID card and a PIN pad using two separate keys: one for authentication and another for confirming the vote.

19
New cards

How is vote anonymity ensured?

Encrypted vote is signed (blue envelope), then placed in a digital signature envelope (yellow), separating identity from the vote.

20
New cards

What is homomorphic encryption?

Encryption allowing computation on ciphertexts without decrypting them.

21
New cards

How does homomorphic encryption benefit e-voting?

Votes can be counted without revealing individual choices, preserving voter privacy.

22
New cards

What are some examples of hidden services?

Tor Mail, Tor Char

DuckDuckGo

Wikileaks