{"id":60922,"date":"2015-03-12T19:47:53","date_gmt":"2015-03-12T23:47:53","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/guarantees-for-online-anonymity\/"},"modified":"2015-03-12T19:47:53","modified_gmt":"2015-03-12T23:47:53","slug":"guarantees-for-online-anonymity","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/guarantees-for-online-anonymity\/","title":{"rendered":"Guarantees for online anonymity?"},"content":{"rendered":"<p><p>  Anonymity on the Internet is possible only up to a certain  degree. Therefore, it is possible that others may see who is  visiting an online advice site on sexual abuse, or who frequently  looks up information about a certain disease, for example. Seeing  that this kind of private information can be linked to their  identity, users will often resort to special online anonymization  services.<\/p>\n<p>    One of the most popular tools is Tor. Since the beginning of    the year, alone more than two million users have used it to    anonymize their Internet connection data. These services will    not only conceal browsing behavior, but also the identity of    the user, and that of any other recipients. These will usually    be other websites, but could also be another person. Tor works    in a way that allows users to establish a connection that is    then upheld through its own network. The Tor network comprises    up to 6,000 servers, mostly run by volunteers, which computer    scientists refer to as \"nodes.\" And since every node only    receives the minimal amount of data necessary to relay the    information in question, it becomes far more difficult to    de-anonymize both the transmitter and the recipient of the    data.  <\/p>\n<p>    \"The Tor network isn't perfect, however,\" says Esfandiar    Mohammadi, a researcher at the Research Center for IT Security,    CISPA, and a doctoral candidate at the Graduate School for    Computer Science in Saarbrcken. \"For one, unanticipated    attacks at a network level can endanger anonymity. Also, the    degree of anonymity the network achieves is highly variable,    since volunteers don't necessarily operate their nodes    continually or regularly,\" says Mohammadi.  <\/p>\n<p>    In collaboration with CISPA researcher Sebastian Meiser, who is    also a postgraduate at the Saarbrcken Graduate School for    Computer Science, Mohammadi developed a program that can    provide an accurate assessment of the level of anonymity an    individual user achieves, even while basing the estimate on the    fluctuations of the Tor network. According to the researchers,    this feature is a worldwide first.  <\/p>\n<p>    \"An attacker that compromises Tor servers can derive the    identity of a user with a certain probability. This is exactly    what our system calculates,\" Sebastian Meiser explains. The two    Saarbrcken researchers based their technique, which they named    \"MATor,\" on a mathematical model that they extended to include    different categories of possible attacks. \"In order to indicate    the probability of de-anonymization, our program performs its    calculations using data that is aggregated once an hour and    published on the network immediately. MATor also takes the    specifics of the respective Internet connection into account,    as well as the individual configurations of the Tor software,\"    Meiser says. This feature is also intended as a basis for a    so-called plugin, a small extension program for the software    \"Tor Browser\" that the researchers now want to develop.    Integrated into the Tor software, this could run in the    background and simply notify users as soon as their connection    became too unsafe.  <\/p>\n<p>    Story Source:  <\/p>\n<p>    The above story is based on materials provided by    University    Saarland. Note: Materials may be edited for    content and length.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.sciencedaily.com\/releases\/2015\/03\/150311081518.htm\/RK=0\/RS=ec68VJHHRfI2pPQRUhuRMkK7C3k-\" title=\"Guarantees for online anonymity?\">Guarantees for online anonymity?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example. Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/guarantees-for-online-anonymity\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-60922","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/60922"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=60922"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/60922\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=60922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=60922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=60922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}