PA

Network Anonymity and Blockchain

Network Anonymity Introduction

In this lecture, we explored the topic of network anonymity, specifically focusing on how to achieve anonymity over the internet using technologies like Tor compared to traditional mixed networks. One of the main points of discussion was the concept of perfect forward secrecy.

Overview of Encryption in Mixed Networks

In traditional mixed networks, data traffic is secured using public and private key pairs. The encryption process involves a sender encrypting a message with the receiver’s public key, which can then be decrypted by the receiver using their private key. However, the vulnerability arises when the private key is compromised. If an attacker were to gain access to the private key, they could theoretically decrypt all future communications as well as any past communications that were recorded prior to the key compromise.

Perfect Forward Secrecy in Tor

Tor improves on this concept by implementing perfect forward secrecy. Rather than relying on a static key pair, Tor clients negotiate new public/private key pairs with each relay for every communication session. This means that each session generates ephemeral keys that are destroyed after use, significantly enhancing security by ensuring that compromise of a single key would not compromise previous or future sessions. Sessions are defined by specific activities, such as accessing a website. Anytime a user navigates to a new web page, a new communication session is established requiring new sockets, key exchanges, and identification of relays.

Understanding Sockets and Circuit Creation

The session keys play a crucial role in Tor's operation—the communication message is encrypted in layers, with each relay (or circuit) decrypting a layer sequentially. The circuit typically involves three hops (relay nodes), with the first being the entry or guard relay, followed by middle relays, and the final hop being the exit relay. The number of hops can be adapted to enhance anonymity, but by default, three hops are standard.

Potential Threats and Security Compromises

Using Tor does not guarantee absolute anonymity, particularly if an attacker controls both the entry and exit relays—a scenario known as a predecessor attack. Estimates suggest that with approximately 8,000 relays, the probability of a malicious actor successfully controlling both points is relatively low. However, continued use also risks re-establishing connections that may eventually link to a known entry and exit node configuration.

To mitigate risks related to predecessor attacks, modifying socket lifetimes—defaulting to ten minutes—may help, although this approach is complicated by user behavior that generates new circuits frequently. Thus, it's crucial to maintain control over which relays serve as entry and exit nodes to safeguard user anonymity.

Selection of Relays

The Tor network handles the selection of relays through a directory that is updated periodically, ensuring they meet reliability and uptime standards. The integrity of the relay selection process prevents malicious users from compromising entry and exit nodes to protect against traffic correlation attacks.

Hidden Services

Tor offers the ability to host hidden services, where service providers can operate anonymously without disclosing their IP addresses. The process begins when an onion service sets up introduction points via the hidden service directory, allowing clients to reach these services without knowing the service’s actual IP address. This process significantly enhances the ability to skirt government censorship and exposure.

The Role of Bridges in Censorship Circumvention

Tor bridges are unlisted, private relays that help users avoid detection by censoring authorities, although sophisticated deep packet inspection techniques pose ongoing challenges. To counteract such monitoring, Tor utilizes pluggable transport designs to obfuscate traffic, disguising it as ordinary internet traffic, thereby complicating detection efforts.

Fundamentals of Blockchain Technology

The latter part of the lecture transitioned into a discussion about blockchain technology, highlighting its decentralized and tamper-resistant nature. Blockchain operates as a digital ledger that records transactions in blocks, creating a permanent and immutable history. Each block is linked chronologically to the previous one, forming a robust chain that can be public or private depending on the intended use.

Types of Blockchains

  • Public Blockchains: Anyone can join and contribute; exemplified by cryptocurrencies like Bitcoin.

  • Private Blockchains: Access is restricted to selected participants; utilized in corporate environments, healthcare, and other sensitive applications.

Participants (Nodes) in Blockchain

Nodes are essential to the operation of a blockchain, categorized into three types:

  1. Full Nodes: Maintain a complete copy of the blockchain to validate transactions and blocks.

  2. Lightweight Nodes: Rely on full nodes to send transactions without keeping an entire copy of the blockchain, reducing resource requirements.

  3. Publishing Nodes: Create and publish new blocks to the network, including participants such as miners and validators.

In conclusion, effective anonymity in network communications relies heavily on the use of technologies like Tor, which enhance security through innovative key management practices and user engagement. Meanwhile, the principles of blockchain offer a framework for secure, decentralized transaction recordings that have vast applications across numerous sectors.