Anonymous Communication

Overlay Communication

威胁模型 Threat Model - Insider Byzantine Attacker

With limited view of network: an attacker might have tight control over a network.

Anonymizing Proxy

Pasted image 20230316195334.png|undefined

Crowds Algorithm

Pasted image 20230316200628.png|undefined

Source Routing

POF-based Source Routing

  • Protocol Oblivious Forwarding 协议无关转发机制
  • 使用 forwarding table 指定每次路由转发的端口号
  • 为了防止端口号泄露,需要对非邻居隐藏自己的端口号

Pasted image 20230316201500.png|undefined

Onion Routing

Pasted image 20230317122231.png|undefined


Portions of the Internet purposefully not open to public view or hidden networks whose architecture is superimposed on that of Internet.