2018
DOI: 10.1515/popets-2018-0026
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Pass: Bypassing Internet Challenges Anonymously

Abstract: The growth of content delivery networks (CDNs) has engendered centralized control over the serving of internet content. An unwanted by-product of this growth is that CDNs are fast becoming global arbiters for which content requests are allowed and which are blocked in an attempt to stanch malicious traffic. In particular, in some cases honest users-especially those behind shared IP addresses, including users of privacy tools such as Tor, VPNs, and I2P - can be unfairly targeted by attempted ‘catch-all solution… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 70 publications
(34 citation statements)
references
References 20 publications
0
34
0
Order By: Relevance
“…Public Key Linkability ODoH targets may give each client a unique HPKE key for query encryption in an attempt to deanonymize them. This is a common problem with protocols of this form, including Privacy Pass [26]. Multiple mitigations exist against this type of attack.…”
Section: Denial-of-servicementioning
confidence: 99%
“…Public Key Linkability ODoH targets may give each client a unique HPKE key for query encryption in an attempt to deanonymize them. This is a common problem with protocols of this form, including Privacy Pass [26]. Multiple mitigations exist against this type of attack.…”
Section: Denial-of-servicementioning
confidence: 99%
“…Many web applications do not properly protect sensitive data, such as credit cards, tax IDs, and authentication credentials. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes [30]. They believe sensitive data deserves extra protection such as encryption at rest or in transit, as well as special precautions when exchanged with the browser.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, multiple notifications are a signal to users that the system may be generating false positive reports. Some participants may indeed see the incident notifications frequently due to false positives -e.g., caused by use of privacy enhancing technologies (VPN, private browsing) [39] or frequent travel or multiple device use, for example, VN12 explains, "Because I have like two accounts. I have never encountered such problem with one account, but with the other account, I always encounter that problem.…”
Section: B Mental Model Generationmentioning
confidence: 99%