[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Israel Sold American Weapons to Azerbaijan to Kill Armenian Christians

Daily MEMES YouTube Hates | YouTube is Fighting ME all the Way | Making ME Remove Memes | Part 188

New fear unlocked while stuck in highway traffic - Indian truck driver on his phone smashes into

RFK Jr. says the largest tech companies will permit Americans to access their personal health data

I just researched this, and it’s true—MUST SEE!!

Savage invader is disturbed that English people exist in an area he thought had been conquered

Jackson Hole's Parting Advice: Accept Even More Migrants To Offset Demographic Collapse, Or Else

Ecuador Angered! China-built Massive Dam is Tofu-Dreg, Ecuador Demands $400 Million Compensation

UK economy on brink of collapse (Needs IMF Bailout)

How Red Light Unlocks Your Body’s Hidden Fat-Burning Switch

The Mar-a-Lago Accord Confirmed: Miran Brings Trump's Reset To The Fed ($8,000 Gold)

This taboo sex act could save your relationship, expert insists: ‘Catalyst for conversations’

LA Police Bust Burglary Crew Suspected In 92 Residential Heists

Top 10 Jobs AI is Going to Wipe Out

It’s REALLY Happening! The Australian Continent Is Drifting Towards Asia

Broken Germany Discovers BRUTAL Reality

Nuclear War, Trump's New $500 dollar note: Armstrong says gold is going much higher

Scientists unlock 30-year mystery: Rare micronutrient holds key to brain health and cancer defense

City of Fort Wayne proposing changes to food, alcohol requirements for Riverfront Liquor Licenses

Cash Jordan: Migrant MOB BLOCKS Whitehouse… Demands ‘11 Million Illegals’ Stay

Not much going on that I can find today

In Britain, they are secretly preparing for mass deaths

These Are The Best And Worst Countries For Work (US Last Place)-Life Balance

These Are The World's Most Powerful Cars

Doctor: Trump has 6 to 8 Months TO LIVE?!

Whatever Happened to Robert E. Lee's 7 Children

Is the Wailing Wall Actually a Roman Fort?

Israelis Persecute Americans

Israelis SHOCKED The World Hates Them

Ghost Dancers and Democracy: Tucker Carlson


Resistance
See other Resistance Articles

Title: Vanish: Enhancing the Privacy of the Web with Self-Destructing Data
Source: [None]
URL Source: http://vanish.cs.washington.edu/
Published: Feb 10, 2010
Author: ?
Post Date: 2010-02-10 10:07:50 by PSUSA
Ping List: *libertarians*     Subscribe to *libertarians*
Keywords: None
Views: 107
Comments: 6

Update, 9/20/2009:

On Sept. 20, 2009 we released a new version of the Vanish research prototype. This prototype implements several new defenses that we wrote about in our two papers on Vanish. These defenses address a specific vulnerability reported by other researchers earlier this week. However, the implications of this update are much broader; the new prototype illustrates the independence of the Vanish architecture and concepts from the underlying storage infrastructure. The source code for the new prototype is available here.

As with our original prototype, we stress that we are releasing the prototype for research purposes. The Vanish prototype should only be used for experimental purposes, and we encourage researchers to analyze and improve upon it. The study of new systems, attacks, and defenses is how the field of computer security progresses, and we are looking forward to future analyses of Vanish. Finally, we strengthen our original advice of being cautious if you wish to use Vanish for any purpose other than research.

Overview

Computing and communicating through the Web makes it virtually impossible to leave the past behind. College Facebook posts or pictures can resurface during a job interview; a lost or stolen laptop can expose personal photos or messages; or a legal investigation can subpoena the entire contents of a home or work computer, uncovering incriminating or just embarrassing details from the past.

Our research seeks to protect the privacy of past, archived data — such as copies of emails maintained by an email provider — against accidental, malicious, and legal attacks. Specifically, we wish to ensure that all copies of certain data become unreadable after a user-specified time, without any specific action on the part of a user, and even if an attacker obtains both a cached copy of that data and the user's cryptographic keys and passwords.

Vanish is a research project aimed at meeting this challenge through a novel integration of cryptographic techniques with global-scale, P2P, distributed hash tables (DHTs). We initially implemented a proof-of-concept Vanish prototype that uses the million-plus-node Vuze BitTorrent DHT. We have since found that the current Vuze DHT implementation is not adequately protected to support an application such as Vanish. We are now studying ways of improving the suitability of existing DHTs such as Vuze to Vanish and other security-oriented applications. We are also investigating architectural changes for these applications to make better use of existing global-scale DHTs.

We believe that Vanish is a significant step forward to realizing the vision of self-destructing data. On September 20, 2009 we released a new version of the Vanish prototype. We believe that the future for self-destructing data is to spread keys across multiple storage systems (DHTs or not DHTs). To demonstrate this potential, the new prototype splits the keys across both Vuze DHT and OpenDHT. A short-term consequence is that the new prototype is immune to the specific attacks recently released by others. A longer-term consequence is that this new prototype illustrates the feasibility of building Vanish off of a diverse collection of remote storage systems (see our paper for a description of threat models). You can read more about this hybrid architecture here.

However, we recommend that at this time, the Vanish prototype only be used for experimental purposes. We do encourage researchers, however, to analyze it and improve upon it. We strongly believe that realizing Vanish's vision would represent a significant step toward achieving privacy in today's unforgetful age.

Immediate Defenses Against the Recent Attacks

Vanish is a research project designed to advance science, and we firmly believe that it has done so. We released our research prototype -- which only implements some of our broader Vanish concepts -- so that other researchers can study and improve it.

Recently, a group of researchers from U. Michigan, Princeton, and U Texas have discovered a vulnerability in our original Vanish research prototype. Their attacks are driven by two features in Vuze that turn out to work against our initial prototype. They are however not a fundamental flaw in the concepts behind Vanish. Without these Vuze features their current attack wouldn't work.

Those features are:

  1. No limit of the number of nodes who can join the DHT from a given machine. Limiting the number of ports is a simple, yet incredibly effective countermeasure for this. Our new paper presents even stronger countermeasures.

  2. Vuze employs an overly eager replication mechanism, which disseminates data to any newly joined node right away. In essence, a node volunteers all of its data immediately to new nodes, which is what makes their hopping attack so efficient. We show in our new paper that performing replication only when needed can counter the hopping aspect of this attack.

Disabling these features in the DHT would have significant positive impact on the security of a Vuze-based Vanish system, while preserving properties like availability and persistence. Vanish could also use a completely different DHT, and can be strengthened in many other ways. In fact, that is our vision -- that as our research progresses we will see Vanish systems building on top of multiple, heterogeneous storage systems with complementary properties. Our paper discusses these and other issues in significantly more detail.

Thinking in Perspective: A Hybrid Approach for Self-Destructing Data

We at Vanish look much more broadly than immediate defenses against known attacks. Initially, Vanish was designed to achieve self-destructing data via reliance on a completely decentralized DHT. At the complete end of the spectrum, previous work has shown how self-destructing data can be achieved by relying on centralized trusted services (although no previous solution showed the applicability of self-destructing data to the web). These two approaches have very different weaknesses, strengths, and threat models. We believe that the future for self-destructing data is to combine the two approaches in a unified architecture.

For this, we propose a hybrid model, where Vanish key pieces are scattered across both a centralized system and a distributed system (or more such systems). Such a solution would combine the benefits of both worlds and will provide increased levels of security over either individual approach. Our newly-released Vanish prototype (version 0.2 and onwards) is an illustration of this concept: it relies on both the open-access, decentralized Vuze DHT and on the closed-access, centrally-managed OpenDHT. You can read more about our hybrid architecture in our new paper.

Naturally, we realize that the existing Vuze DHT exhibits characteristics that are counterproductive for Vanish. We are therefore actively working to strengthen Vuze for Vanish, as well. Moreover, the Vanish system is network-agnostic and could be easily ported onto more robust storage systems (DHTs or other types of systems).

Our overall vision of a hybrid solution, plus our active modifications of Vuze, demonstrates that Vanish is much broader than the current prototype implementation. It's ongoing research and not an end product. Above all, we strongly believe that the Vanish concept is fundamentally sound, despite the recent vulnerabilities found in its previous prototype implementation.

Finally, we wanted to put the recent attacks against the original Vanish prototype in context. Proposing systems, finding attacks, and implementing stronger systems is exactly how research works in the security community. Take Tor, for example. Tor radically advances the state of the art in Internet anonymity, but researchers (including ourselves) have found attacks against Tor. Just as the attacks against Tor don't invalidate it, the current attacks against the first Vanish research prototype don't invalidate Vanish either.

Subscribe to *libertarians*

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: All (#0)

http://vanish.cs.washington.edu/download.html

Download the Vanish Source Code

The research prototype is distributed in three separate packages, two of which correspond to the Vanish system and the third corresponds to the Vanish Firefox Plugin.

Package NameDescription

License

Vanish CoreIncludes all Vanish-specific functionality + an OpenDHT backendAcademic

Vuze Vanish BackendModified version of Vuze storing metadata provided by Vanish CoreGPL v.2

Firefox Vanish PluginEnables users to use Vanish on the Web via Firefox 3.0+

MPL


Click for Privacy and Preparedness files

Alex Jones is the Robert Tilton of the conspiracy world. ~Mister Clean

Live free or die kill ~~ Me

PSUSA  posted on  2010-02-10   10:08:59 ET  Reply   Trace   Private Reply  


#2. To: PSUSA (#1)

Do you know if adding the Firefox plugin would be apparent to me as I browse the web?

Thanks.

Lod  posted on  2010-02-10   10:16:00 ET  Reply   Trace   Private Reply  


#3. To: Lod (#2)

I don't know.

I just found this on WRH. I had to dig a little to find the site though. Right now, you know as much about this as I do.


Click for Privacy and Preparedness files

Alex Jones is the Robert Tilton of the conspiracy world. ~Mister Clean

Live free or die kill ~~ Me

PSUSA  posted on  2010-02-10   10:17:53 ET  Reply   Trace   Private Reply  


#4. To: PSUSA (#3)

I'll try to let you know if it blows up the browser or the box. ;-)

Lod  posted on  2010-02-10   10:21:34 ET  Reply   Trace   Private Reply  


#5. To: All (#4)

The Plugin download link didn't work here.

Lod  posted on  2010-02-10   10:24:01 ET  Reply   Trace   Private Reply  


#6. To: All (#5)

good information and instructions on vanish and the plugin -

www.p2pnet.net/story/26730

Lod  posted on  2010-02-10   10:26:54 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]