Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications
In recent years, whistleblowing has lead to big headlines aroundthe world. This thesis looks at whistleblower systems, which are systems specically created for whistleblowers to submit tips anonymously. The problem is how to engineer such a system asto maximize the anonymity for the whistleblower wh...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
KTH, Skolan för datavetenskap och kommunikation (CSC)
2016
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190884 |
id |
ndltd-UPSALLA1-oai-DiVA.org-kth-190884 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-kth-1908842018-01-11T05:11:26ZAnonymous Javascript Cryptography and CoverTraffic in Whistleblowing ApplicationsengAnonym Javascript-kryptogra och täckningstrakför visselblåsarsystemUddholm, JoakimKTH, Skolan för datavetenskap och kommunikation (CSC)2016anonymitywhistleblowingcryptographytorindistinguishabilityanonymous encryptionComputer SciencesDatavetenskap (datalogi)In recent years, whistleblowing has lead to big headlines aroundthe world. This thesis looks at whistleblower systems, which are systems specically created for whistleblowers to submit tips anonymously. The problem is how to engineer such a system asto maximize the anonymity for the whistleblower whilst at the same time remain usable.The thesis evaluates existing implementations for the whistle-blowing problem. Eleven Swedish newspapers are evaluated for potential threats against their whistleblowing service.I suggest a new system that tries to improve on existing systems. New features includes the introduction of JavaScript cryptography to lessen the reliance of trust for a hosted server. Use of anonymous encryption and cover traffic to partially anonymize the recipient, size and timing metadata on submissions sent by the whistleblowers. I explore the implementations of these features and the viability to address threats against JavaScript integrity by use of cover traffic.The results show that JavaScript encrypted submissions are viable. The tamper detection system can provide some integrity for the JavaScript client. Cover traffic for the initial submissions to the journalists was also shown to be feasible. However, cover traffic for replies sent back-and-forth between whistleblower and journalist consumed too much data transfer and was too slow to be useful. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190884application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
anonymity whistleblowing cryptography tor indistinguishability anonymous encryption Computer Sciences Datavetenskap (datalogi) |
spellingShingle |
anonymity whistleblowing cryptography tor indistinguishability anonymous encryption Computer Sciences Datavetenskap (datalogi) Uddholm, Joakim Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications |
description |
In recent years, whistleblowing has lead to big headlines aroundthe world. This thesis looks at whistleblower systems, which are systems specically created for whistleblowers to submit tips anonymously. The problem is how to engineer such a system asto maximize the anonymity for the whistleblower whilst at the same time remain usable.The thesis evaluates existing implementations for the whistle-blowing problem. Eleven Swedish newspapers are evaluated for potential threats against their whistleblowing service.I suggest a new system that tries to improve on existing systems. New features includes the introduction of JavaScript cryptography to lessen the reliance of trust for a hosted server. Use of anonymous encryption and cover traffic to partially anonymize the recipient, size and timing metadata on submissions sent by the whistleblowers. I explore the implementations of these features and the viability to address threats against JavaScript integrity by use of cover traffic.The results show that JavaScript encrypted submissions are viable. The tamper detection system can provide some integrity for the JavaScript client. Cover traffic for the initial submissions to the journalists was also shown to be feasible. However, cover traffic for replies sent back-and-forth between whistleblower and journalist consumed too much data transfer and was too slow to be useful. |
author |
Uddholm, Joakim |
author_facet |
Uddholm, Joakim |
author_sort |
Uddholm, Joakim |
title |
Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications |
title_short |
Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications |
title_full |
Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications |
title_fullStr |
Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications |
title_full_unstemmed |
Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications |
title_sort |
anonymous javascript cryptography and covertraffic in whistleblowing applications |
publisher |
KTH, Skolan för datavetenskap och kommunikation (CSC) |
publishDate |
2016 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190884 |
work_keys_str_mv |
AT uddholmjoakim anonymousjavascriptcryptographyandcovertrafficinwhistleblowingapplications AT uddholmjoakim anonymjavascriptkryptograochtackningstrakforvisselblasarsystem |
_version_ |
1718604392663351296 |