Covert channel vulnerabilities in anonymity systems
Excerpt: The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protect users’ privacy by restricting unauthorized access to their identity. This requirement can be considered as a flow control policy in the well established field of multilevel secure systems. I apply previous research on covert channels (unintended means to communicate in violation of a security policy) to analyze several anonymity systems in an innovative way.
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf
Urs
Comments
- Anonymous
January 01, 2003
PingBack from http://ntoolz.net/blog/2008/06/22/microsoft-is-winning-the-nac-war-expert-says/