TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Selected Papers in Anonymity

79 点作者 ShaneWilton将近 10 年前

7 条评论

e12e将近 10 年前
While not directly related to Anonymity, I also strongly recommend Warren and Brandeis: &quot;The Right to Privacy&quot; as reading on some arguments against the &quot;... if you have nothing to hide&quot;-arguments:<p><a href="http:&#x2F;&#x2F;groups.csail.mit.edu&#x2F;mac&#x2F;classes&#x2F;6.805&#x2F;articles&#x2F;privacy&#x2F;Privacy_brand_warr2.html" rel="nofollow">http:&#x2F;&#x2F;groups.csail.mit.edu&#x2F;mac&#x2F;classes&#x2F;6.805&#x2F;articles&#x2F;priva...</a>
评论 #9941840 未加载
zkhalique将近 10 年前
Anonymity itself is hard to maintain. There are generally two ways to do so:<p>1) Accounts can be obtained at a network which is KNOWN not to discover who the owners are. These accounts can then be used to open other accounts at other organizations and networks in a sort of graph, and eventually double back on themselves once or twice.<p>2) For networks which do not allow anonymous accounts, nor allow the use of other &quot;anonymity-friendly&quot; networks to authenticate with or create accounts, one would have to use account hijacking. That is to say, use an existing account belonging to an existing member. This should be done carefully, as the member might have to face consequences for any actions you perform with their account, if they are discovered. It is advisable to know whether the organization has a provision for dropping proceedings against members whose accounts have been found to be &quot;hacked&quot;.<p>Of course, with all this, you would still have to make sure repeated communication does not bear any fingerprints that could be used to identify you. For instance: the language you use, the time of day you post, the location you post from, the subject you post about, all those things must have a sufficient number of possible candidates so as to make actually confronting them in person (or e.g. tampering with their internet connection) infeasible or unattractive.<p>I figure since this is Hacker News, it is a good place to post this analysis.
评论 #9940216 未加载
kriro将近 10 年前
This seems like an excellent list on first glance. Is there a similar &quot;practical advice&quot; type of list.<p>Sadly, I tried to imagine I&#x27;d need to be as anonymous as possible and couldn&#x27;t even figure out how to get an untraceable email address (legally). My basic thought was to use some public WLAN (hoping for no MiTM), ideally not close to where I actually live and then use Tor to create a Hushmail account (as I recall the EFF recommends it). Alas it seems that&#x27;s already flawed since a quick websearch suggests Hushmail cooperates with government agencies.<p>Admittedly I haven&#x27;t spend a lot of time researching available options but I think it&#x27;s pretty hard to even get step 1 right. I can only imagine how hard it must be for someone who isn&#x27;t tech saavy at all.
评论 #9940892 未加载
评论 #9941538 未加载
vippy将近 10 年前
The best:<p>Tor: The Second-Generation Onion Router<p>Untraceable electronic mail, return addresses, and digital pseudonyms<p>Location Diversity in Anonymity Networks<p>Basically, Roger Dingledine and David L. Chaum
评论 #9939724 未加载
unabridged将近 10 年前
Its kind of disheartening when the websites for Free Haven and Mixminion don&#x27;t even have HTTPS as an option.
评论 #9942087 未加载
ecesena将近 10 年前
Thanks for sharing!<p>If interested in pseudonimity, an interesting keyword is &quot;Direct Anonymous Attestation&quot; -- the protocol was first invented in the context of the Trusted Computing and generated a lot of interesting research.
0xFFC将近 10 年前
I don&#x27;t know you , But you made my day.I don&#x27;t know how to thank you !