Phantom Anonymity Protocol
Encyclopedia
The Phantom anonymity protocol was designed in 2008 by Swedish security researcher Magnus Bråding to provide anonymity optimized for the current conditions and needs of average internet users. The design goal was feasibility for mass adoption as a de facto internet anonymization standard. This goal differentiates it from other anonymization protocols such as Tor
Tor (anonymity network)
Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis...

, which have seen only limited adoption among the masses. The Phantom protocol designer hopes to change this situation and provide secure anonymity to everyone, including non-technical people.

The protocol was first presented publicly by Magnus Bråding at the IT security and hacking conference DEFCON
DEF CON
DEF CON is one of the world's largest annual computer hacker conventions, held every year in Las Vegas, Nevada...

 16 in Las Vegas 2008.

A first implementation was completed in the second half of 2010 by Johannes Schlumberger, as a final year project at the University of Erlangen-Nuremberg, with initial implementation work also being performed by Michael Prinzinger at the same university. This source code was released to the public in March 2011.

Details

One of the most important aspects of the protocol is that it is completely distributed and decentralized, making it much more resilient to censorship or attempts to shut it down than existing anonymization protocols like Tor
Tor (anonymity network)
Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis...

.

The protocol design stems from eight goals:
  1. Completely decentralized.
    No critical or weak points to attack or put (il)legal pressure on.
  2. Maximum resistance against all kinds of DoS attacks.
    Direct technical destructive attacks will practically be the only possible way to even attempt to stop it.
  3. Theoretically secure anonymization.
    Probabilistic methods (contrary to deterministic methods) must be used in a completely decentralized design like this, where no other peer can be trusted, so focus is put on optimizing these methods.
  4. Theoretically secure end-to-end transport encryption.
    This is simple in itself, but still important in the context of anonymization.
  5. Completely (virtually) isolated from the "normal" Internet.
    No one should have to worry about crimes being perpetrated from their own IP address.
  6. Maximum protection against identification of protocol usage through traffic analysis.
    You never know what the next draconian law might be.
  7. Capable of handling larger data volumes, with acceptable throughput.
    Most existing anonymization solutions are practically unusable for (or even prohibit) larger data volumes.
  8. Generic and well-abstracted design, compatible with all new and existing network enabled software.
    Software application developer participation should not be needed, it should be easy to apply the anonymization to both new and already existing products like e.g. web browsers and file transfer software.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK