Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Towards an analysis of onion routing security
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Abstracting application-level web security
Proceedings of the 11th international conference on World Wide Web
Covert channels and anonymizing networks
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Privacy enhancing identity management: protection against re-identification and profiling
Proceedings of the 2005 workshop on Digital identity management
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
BitBlender: light-weight anonymity for BitTorrent
Proceedings of the workshop on Applications of private and anonymous communications
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Managing university internet access: balancing the need for security, privacy and digital evidence
Journal in Computer Virology
Towards practical attacker classification for risk analysis in anonymous communication
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
We present attacks on the anonymity and pseudonymity provided by a "lonely hearts" dating service and by the HushMail encrypted email system. We move on to discuss some generic attacks upon anonymous systems based on the engineering reality of these systems rather than the theoretical foundations on which they are based. However, for less sophisticated users it is social engineering attacks, owing nothing to computer science, that pose the biggest day-to-day danger. This practical experience then permits a start to be made on developing a security policy model for pseudonymous communications.