|The Unix and Internet Fundamentals HOWTO, by Eric Raymond|
|Location Diversity in Anonymity Networks||Search for a title, author or keyword|
Location Diversity in Anonymity Networks
by Nick Feamster and Roger Dingledine. Anonymity networks have long relied on diversity of node location for protection against attacks — typically an adversary who can observe a larger fraction of the network can launch a more effective attack. We investigate the diversity of two deployed anonymity networks, Mixmaster and Tor, with respect to an adversary who controls a single Internet administrative domain. Specifically, we implement a variant of a recently proposed technique that passively estimates the set of administrative domains (also known as autonomous systems, or ASes) between two arbitrary end-hosts without having access to either end of the path. Using this technique, we analyze the AS-level paths that are likely to be used in these anonymity networks. We find several cases in each network where multiple nodes are in the same administrative domain. Further, many paths between nodes, and between nodes and popular endpoints, traverse the same domain.
|Location Diversity in Anonymity Networks||Disclaimer: this link points to content provided by other sites.|