Get Started. It's Free
or sign up with your email address
Anonymization by Mind Map: Anonymization

1. Chaum Mixes (1981)

1.1. anonymous email

1.2. "MIX"

1.3. sender anonymity

1.4. traffic analysis protection

2. TOR (2004)

2.1. perfect forward secrecy

2.2. general purpose TCP transport

2.3. rendezvous system

2.3.1. hidden services

2.3.2. websites

3. Java Anon Proxy (JAP)

3.1. Mix Cascades

3.2. Users choose which nodes to trust

4. I2P

4.1. anonymous network layer

4.2. BitTorrent / P2P file sharing

5. Onion Routing (1998)

5.1. network nodes / onion routers

5.2. layers of encryption

5.3. US Patent (1998)

5.4. protect privacy of sender and recipient

5.5. re-routing on unpredictable path

5.6. trust in individual nodes?

5.7. unlinkability

5.8. "routing onions"

5.9. "reply onions"

5.10. weaknesses

5.10.1. timing analysis

5.10.2. intersection attacks

5.10.3. path reformations

6. Cryptography

6.1. public key cryptography

6.2. symmetric cyphers

6.3. hashes

7. Garlic Routing

7.1. variant of onion routing

7.2. avoid traffic analysis

7.3. I2P

8. Anonymous P2P

8.1. anonymity

8.2. pseudonymity

8.3. opennet

8.4. darknet