Skip to main content

An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks

  • Conference paper
Privacy Enhancing Technologies (PET 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2760))

Included in the following conference series:

Abstract

Peer-to-peer networks are a popular platform for file sharing, but only few of them offer strong anonymity to their users. GNUnet is a new peer-to-peer network that claims to provide practical anonymous and censorship-resistant file sharing. In this paper we show that GNUnet’s performance-enhancing features can be exploited to determine the initiator of a download. We also present an efficient filter mechanism for GNUnet. Assuming that content filtering is legally enforced, GNUnet can be censored at a large scale.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J.: The eternity service. In: Proceedings of Pragocrypt 1996 (1996)

    Google Scholar 

  2. Bennett, K., Grothoff, C.: GAP – practical anonymous networking. In: Designing Privacy Enhancing Technologies – International Workshop on Design Issues in Anonymity and Unobservability 2003. Springer, Heidelberg (2003)

    Google Scholar 

  3. Bennett, K., Grothoff, C., Horozov, T., Patrascu, I.: Efficient sharing of encrypted data. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 107–120. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 30–45. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Chaum, D.: Untraceable electronic mail, return adresses and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  6. Clarke, I., Miller, S.G., Hong, T.W.: Oskar Sandberg, and Brandon Wiley. Protecting free expression online with Freenet. IEEE Internet Computing, 40–49 (2002)

    Google Scholar 

  7. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Dingledine, R., Freedman, M.J., Molnar, D.: The free haven project: Distributed anonymous storage service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 67–95. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Frankel, J., Pepper, T.: Gnutella v. 0.56. Nullsoft (2000)

    Google Scholar 

  10. Grothoff, C., Patrascu, I., Bennett, K., Stef, T., Horozov, T.: GNET. Whitepaper version 0.5.2 (2002)

    Google Scholar 

  11. Grothoff, C.: An excess-based economic model for resource allocation in peer-to-peer networks. Wirtschaftsinformatik (3) (2003)

    Google Scholar 

  12. Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: Proceedings of the 7th USENIX Security Symposium (1998)

    Google Scholar 

  13. Rubin Marc Waldman, A.D., Cranor, L.F.: Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In: Proc. 9th USENIX Security Symposium, pp. 59–72 (2000)

    Google Scholar 

  14. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity – a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  16. Serjantov, A.: Anonymizing censorship resistant systems. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 111–120. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  17. Shmatikov, V.: Probabilistic analysis of anonymity. In: 15th IEEE Computer Security Foundations Workshop, pp. 119–128. IEEE Computer Society Press, Los Alamitos (2002)

    Google Scholar 

  18. Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Network and Distributed System Security Symposium – NDSS 2002, Internet Society (2002)

    Google Scholar 

  19. Waldman, M., Mazières, D.D.: Tangler: A censorship-resistant publishing system based on document entanglements. In: ACM Conference on Computer and Communications Security, pp. 126–135. ACM Press, New York (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kügler, D. (2003). An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks. In: Dingledine, R. (eds) Privacy Enhancing Technologies. PET 2003. Lecture Notes in Computer Science, vol 2760. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40956-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40956-4_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20610-1

  • Online ISBN: 978-3-540-40956-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics