Get Started. It's Free
or sign up with your email address
Rocket clouds
Anonymization by Mind Map: Anonymization

1. Onion Routing (1998)

1.1. network nodes / onion routers

1.2. layers of encryption

1.3. US Patent (1998)

1.4. protect privacy of sender and recipient

1.5. re-routing on unpredictable path

1.6. trust in individual nodes?

1.7. unlinkability

1.8. "routing onions"

1.9. "reply onions"

1.10. weaknesses

1.10.1. timing analysis

1.10.2. intersection attacks

1.10.3. path reformations

2. Chaum Mixes (1981)

2.1. anonymous email

2.2. "MIX"

2.3. sender anonymity

2.4. traffic analysis protection

3. Cryptography

3.1. public key cryptography

3.2. symmetric cyphers

3.3. hashes

4. TOR (2004)

4.1. perfect forward secrecy

4.2. general purpose TCP transport

4.3. rendezvous system

4.3.1. hidden services

4.3.2. websites

5. Garlic Routing

5.1. variant of onion routing

5.2. avoid traffic analysis

5.3. I2P

6. Java Anon Proxy (JAP)

6.1. Mix Cascades

6.2. Users choose which nodes to trust

7. I2P

7.1. anonymous network layer

7.2. BitTorrent / P2P file sharing

8. Anonymous P2P

8.1. anonymity

8.2. pseudonymity

8.3. opennet

8.4. darknet