Even when network data is encrypted, observers can make inferences about content based on collected metadata. DeadDrop is an exploratory API designed to protect the metadata of a conversation from both outside observers and the facilitating server. To do so, DeadDrop servers are passed no recipient address, instead relying upon the recipient to check for messages of their own volition. In addition, the recipient downloads a copy of every encrypted message on the server to prevent even the server from knowing to whom each message is intended. To these purposes, DeadDrop is mostly successful. However, it does not obscure all information that can potentially be used to identify a client, and slows down quickly as the number of users and messag...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
Abstract — The Dining Cryptographer network (or DC-net) is a privacy preserving communication protoc...
In order to identify ways used to collect data from user communication devices, an analysis of the i...
Most communication systems (e.g., e-mails, instant messengers, VPNs) use encryption to prevent third...
This dissertation addresses the important challenge of efficiency in anonymous communication. Solvin...
Abstract—Denial-of-Service (DoS) flooding attackers benefit from sender anonymity and exit node dive...
A data distributor has given precise data to a set of evidently trusted agents. Some of the data are...
Protecting communications’ metadata can be as important as protecting their content, i.e., recognizi...
Downloading or uploading controversial information can put users at risk, making them hesitant to ac...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
People sometimes need to communicate directly with one another while concealing the communication it...
Data-sharing systems are often used to store sensitive data. Both academia and industry have propose...
The ease of sharing information through the Internet and Cloud Computing inadvertently introduces a ...
This project is a proof-of-concept for software which would allow users to securely store sensitive ...
Most encrypted data formats leak metadata via their plaintext headers, such as format version, encry...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
Abstract — The Dining Cryptographer network (or DC-net) is a privacy preserving communication protoc...
In order to identify ways used to collect data from user communication devices, an analysis of the i...
Most communication systems (e.g., e-mails, instant messengers, VPNs) use encryption to prevent third...
This dissertation addresses the important challenge of efficiency in anonymous communication. Solvin...
Abstract—Denial-of-Service (DoS) flooding attackers benefit from sender anonymity and exit node dive...
A data distributor has given precise data to a set of evidently trusted agents. Some of the data are...
Protecting communications’ metadata can be as important as protecting their content, i.e., recognizi...
Downloading or uploading controversial information can put users at risk, making them hesitant to ac...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
People sometimes need to communicate directly with one another while concealing the communication it...
Data-sharing systems are often used to store sensitive data. Both academia and industry have propose...
The ease of sharing information through the Internet and Cloud Computing inadvertently introduces a ...
This project is a proof-of-concept for software which would allow users to securely store sensitive ...
Most encrypted data formats leak metadata via their plaintext headers, such as format version, encry...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
Abstract — The Dining Cryptographer network (or DC-net) is a privacy preserving communication protoc...
In order to identify ways used to collect data from user communication devices, an analysis of the i...