Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications

In recent years, whistleblowing has lead to big headlines aroundthe world. This thesis looks at whistleblower systems, which are systems specically created for whistleblowers to submit tips anonymously. The problem is how to engineer such a system asto maximize the anonymity for the whistleblower wh...

Full description

Bibliographic Details
Main Author: Uddholm, Joakim
Format: Others
Language:English
Published: KTH, Skolan för datavetenskap och kommunikation (CSC) 2016
Subjects:
tor
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190884
id ndltd-UPSALLA1-oai-DiVA.org-kth-190884
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-kth-1908842018-01-11T05:11:26ZAnonymous Javascript Cryptography and CoverTraffic in Whistleblowing ApplicationsengAnonym Javascript-kryptogra och täckningstrakför visselblåsarsystemUddholm, JoakimKTH, Skolan för datavetenskap och kommunikation (CSC)2016anonymitywhistleblowingcryptographytorindistinguishabilityanonymous encryptionComputer SciencesDatavetenskap (datalogi)In recent years, whistleblowing has lead to big headlines aroundthe world. This thesis looks at whistleblower systems, which are systems specically created for whistleblowers to submit tips anonymously. The problem is how to engineer such a system asto maximize the anonymity for the whistleblower whilst at the same time remain usable.The thesis evaluates existing implementations for the whistle-blowing problem. Eleven Swedish newspapers are evaluated for potential threats against their whistleblowing service.I suggest a new system that tries to improve on existing systems. New features includes the introduction of JavaScript cryptography to lessen the reliance of trust for a hosted server. Use of anonymous encryption and cover traffic to partially anonymize the recipient, size and timing metadata on submissions sent by the whistleblowers. I explore the implementations of these features and the viability to address threats against JavaScript integrity by use of cover traffic.The results show that JavaScript encrypted submissions are viable. The tamper detection system can provide some integrity for the JavaScript client. Cover traffic for the initial submissions to the journalists was also shown to be feasible. However, cover traffic for replies sent back-and-forth between whistleblower and journalist consumed too much data transfer and was too slow to be useful. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190884application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic anonymity
whistleblowing
cryptography
tor
indistinguishability
anonymous encryption
Computer Sciences
Datavetenskap (datalogi)
spellingShingle anonymity
whistleblowing
cryptography
tor
indistinguishability
anonymous encryption
Computer Sciences
Datavetenskap (datalogi)
Uddholm, Joakim
Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications
description In recent years, whistleblowing has lead to big headlines aroundthe world. This thesis looks at whistleblower systems, which are systems specically created for whistleblowers to submit tips anonymously. The problem is how to engineer such a system asto maximize the anonymity for the whistleblower whilst at the same time remain usable.The thesis evaluates existing implementations for the whistle-blowing problem. Eleven Swedish newspapers are evaluated for potential threats against their whistleblowing service.I suggest a new system that tries to improve on existing systems. New features includes the introduction of JavaScript cryptography to lessen the reliance of trust for a hosted server. Use of anonymous encryption and cover traffic to partially anonymize the recipient, size and timing metadata on submissions sent by the whistleblowers. I explore the implementations of these features and the viability to address threats against JavaScript integrity by use of cover traffic.The results show that JavaScript encrypted submissions are viable. The tamper detection system can provide some integrity for the JavaScript client. Cover traffic for the initial submissions to the journalists was also shown to be feasible. However, cover traffic for replies sent back-and-forth between whistleblower and journalist consumed too much data transfer and was too slow to be useful.
author Uddholm, Joakim
author_facet Uddholm, Joakim
author_sort Uddholm, Joakim
title Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications
title_short Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications
title_full Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications
title_fullStr Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications
title_full_unstemmed Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications
title_sort anonymous javascript cryptography and covertraffic in whistleblowing applications
publisher KTH, Skolan för datavetenskap och kommunikation (CSC)
publishDate 2016
url http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190884
work_keys_str_mv AT uddholmjoakim anonymousjavascriptcryptographyandcovertrafficinwhistleblowingapplications
AT uddholmjoakim anonymjavascriptkryptograochtackningstrakforvisselblasarsystem
_version_ 1718604392663351296