{"id":60924,"date":"2015-03-12T19:47:55","date_gmt":"2015-03-12T23:47:55","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cebit-2015-saarland-computer-scientists-present-guarantees-for-online-anonymity\/"},"modified":"2015-03-12T19:47:55","modified_gmt":"2015-03-12T23:47:55","slug":"cebit-2015-saarland-computer-scientists-present-guarantees-for-online-anonymity","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/cebit-2015-saarland-computer-scientists-present-guarantees-for-online-anonymity\/","title":{"rendered":"Cebit 2015: Saarland computer scientists present guarantees for online anonymity"},"content":{"rendered":"<p><p>    IMAGE:Sebastian Meiser and Esfandiar    Mohammadi provide guarantees of users' anonymity within the Tor    network. view    more  <\/p>\n<p>    Credit: Oliver Dietze  <\/p>\n<p>    This news release is available in     German.  <\/p>\n<p>    Anonymity on the Internet is possible only up to a certain    degree. Therefore, it is possible that others may see who is    visiting an online advice site on sexual abuse, or who    frequently looks up information about a certain disease, for    example. Seeing that this kind of private information can be    linked to their identity, users will often resort to special    online anonymization services. One of the most popular tools is    Tor. Since the beginning of the year, alone more than two    million users have used it to anonymize their Internet    connection data. These services will not only conceal browsing    behavior, but also the identity of the user, and that of any    other recipients. These will usually be other websites, but    could also be another person. Tor works in a way that allows    users to establish a connection that is then upheld through its    own network. The Tor network comprises up to 6,000 servers,    mostly run by volunteers, which computer scientists refer to as    \"nodes\". And since every node only receives the minimal amount    of data necessary to relay the information in question, it    becomes far more difficult to de-anonymize both the transmitter    and the recipient of the data.  <\/p>\n<p>    \"The Tor network isn't perfect, however,\" says Esfandiar    Mohammadi, a researcher at the Research Center for IT Security,    CISPA, and a doctoral candidate at the Graduate School for    Computer Science in Saarbrcken. \"For one, unanticipated    attacks at a network level can endanger anonymity. Also, the    degree of anonymity the network achieves is highly variable,    since volunteers don't necessarily operate their nodes    continually or regularly,\" says Mohammadi.  <\/p>\n<p>    In collaboration with CISPA researcher Sebastian Meiser, who is    also a postgraduate at the Saarbrcken Graduate School for    Computer Science, Mohammadi developed a program that can    provide an accurate assessment of the level of anonymity an    individual user achieves, even while basing the estimate on the    fluctuations of the Tor network. According to the researchers,    this feature is a worldwide first.  <\/p>\n<p>    \"An attacker that compromises Tor servers can derive the    identity of a user with a certain probability. This is exactly    what our system calculates,\" Sebastian Meiser explains. The two    Saarbrcken researchers based their technique, which they named    \"MATor\", on a mathematical model that they extended to include    different categories of possible attacks. \"In order to indicate    the probability of de-anonymization, our program performs its    calculations using data that is aggregated once an hour and    published on the network immediately. MATor also takes the    specifics of the respective Internet connection into account,    as well as the individual configurations of the Tor software,\"    Meiser says. This feature is also intended as a basis for a    so-called plugin, a small extension program for the software    \"Tor Browser\" that the researchers now want to develop.    Integrated into the Tor software, this could run in the    background and simply notify users as soon as their connection    became too unsafe.  <\/p>\n<p>    Computer science and informatics at Saarland    University  <\/p>\n<p>    The Department of Computer Science forms the core of the    informatics landscape at Saarland University. A further seven    internationally renowned research institutes are located in the    immediate vicinity on campus. As well as the two Max Planck    Institutes for Informatics and for Software Systems, the    Saarbrcken campus is also home to the German Research Center    for Artificial Intelligence, the Intel Visual Computing    Institute, the Center for IT Security, Privacy and    Accountability (CISPA) and the Cluster of Excellence    'Multimodal Computing and Interaction'.  <\/p>\n<p>    ###  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.eurekalert.org\/pub_releases\/2015-03\/su-c031115.php\/RK=0\/RS=w9NP6IBrIxoyUHhaMvgEBVvmeiw-\" title=\"Cebit 2015: Saarland computer scientists present guarantees for online anonymity\">Cebit 2015: Saarland computer scientists present guarantees for online anonymity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> IMAGE:Sebastian Meiser and Esfandiar Mohammadi provide guarantees of users' anonymity within the Tor network.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/cebit-2015-saarland-computer-scientists-present-guarantees-for-online-anonymity\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-60924","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/60924"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=60924"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/60924\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=60924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=60924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=60924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}