Anonymous Communication

Overlay Communication

威胁模型 Threat Model - Insider Byzantine Attacker

With limited view of network: an attacker might have tight control over a network.

Anonymizing Proxy

Pasted image 20230316195334.png

Crowds Algorithm

Pasted image 20230316200628.png

Source Routing

POF-based Source Routing

  • Protocol Oblivious Forwarding 协议无关转发机制
  • 使用 forwarding table 指定每次路由转发的端口号
  • 为了防止端口号泄露,需要对非邻居隐藏自己的端口号

Pasted image 20230316201500.png

Onion Routing

Pasted image 20230317122231.png

Darknet

Portions of the Internet purposefully not open to public view or hidden networks whose architecture is superimposed on that of Internet.

Attacks