The current state of anonymous file-sharing - Marc's Blog
The current state of anonymous file-sharing - Marc's Blog
The current state of anonymous file-sharing - Marc's Blog
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
1 Different needs for anonymity<br />
If John Doe hears the word "anonymity", it usually leaves the impression <strong>of</strong> a "you<br />
can’t see me!" kind <strong>of</strong> situation. While this might be the common understanding <strong>of</strong> the<br />
word "anonymity", it has to be redefined when it comes to actions taking place on the<br />
internet.<br />
In real life, the amount <strong>of</strong> work that has to be put into taking fingerprints, footprints,<br />
analyzing DNA and other ways <strong>of</strong> identifying who spend some time in a given location<br />
involves a lot more work than the equivalents in the IT world.<br />
It is in the nature <strong>of</strong> anonymity, that it can be achieved in various places and using<br />
various techniques. <strong>The</strong> one thing they all have in common is that a person tries to hide<br />
something from a third party.<br />
In general, and especially in the case <strong>of</strong> IT-networks, a person usually tries to hide:<br />
• Who they are (<strong>The</strong>ir identity)<br />
• What information they acquire/share (<strong>The</strong> content they download/upload)<br />
• Who they talk to (<strong>The</strong> people they communicate with)<br />
• What they do (That they participate at all)<br />
<strong>The</strong> third party they are trying to hide from differs from country to country and from<br />
society to society.<br />
<strong>The</strong> main reason a person is trying to hide one <strong>of</strong> the things mentioned above is because<br />
the society as a whole, certain groups in society or the local legal system is considering<br />
the content or the informations they share/download either amoral or illegal.<br />
Downloading e.g. Cat Stephen’s Song "Peace train” could get you in trouble for different<br />
reasons.<br />
In Germany or the USA, you’d probably be infringing copyright. In Iran, the ruling<br />
government simply wouldn’t want you to listen to that kind <strong>of</strong> music.<br />
<strong>The</strong>re are also people who have the urge to protect their privacy because they don’t see<br />
the need for any third party to collect any kind <strong>of</strong> information about them.<br />
Over the past years there have been many attempts to keep third parties from gathering<br />
information on digital communication. To allow me to keep this thesis at a certain level<br />
<strong>of</strong> detail, I decided to focus on the attempts that allow the <strong>sharing</strong> <strong>of</strong> larger amounts <strong>of</strong><br />
data in a reasonable and scaleable way. Having to explain all the different methods that<br />
allow general purpose <strong>anonymous</strong> communication would extend the scope way beyond<br />
the targeted size <strong>of</strong> this paper.<br />
1