Sign In

Communications of the ACM

ACM TechNews

How to Build Anonymity Into the Internet

View as: Print Mobile App Share:

At the 9th annual Privacy Enhancing Technologies Symposium, security researchers discussed alternatives to existing systems designed to help Internet users maintain their privacy while online.

One proposed solution is called, presented by University of Texas at Arlington iSec research lab co-director Matthew Wright. proposes that in the event of a redesign of Internet architecture, proxies that help preserve anonymity could be built in, with Internet service providers (ISPs) determining points in the network where proxies would be effective.

Williams College professor Barath Raghavan, along with researchers from the University of California, San Diego and the University of Washington, suggested a protocol that could hide a user's Internet Protocol address within the rest of an ISP's traffic.

The researchers say that adding such a system would not damage performance and could work in conjunction with Tor or another privacy-protection service.

They also say that ISPs might even be willing to add the protocol as a benefit to attract customers, similar to call-blocking services offered by telephone providers.
From Technology Review
View Full Article

Abstracts Copyright © 2009 Information Inc., Bethesda, Maryland, USA


No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account