Overview
Explore the fundamental concepts of mix networks and the Katzenpost mix network free software project in this 47-minute talk. Delve into the new anonymity movement that offers stronger protection against global passive adversaries compared to Tor. Learn about the components of mix networks, their role in resisting active and passive attacks, and their applications in encrypted messaging and cryptocurrency transactions. Discover how mix networks add latency and cover traffic to enhance security, and understand the historical context of mix networks versus onion routing. Examine the Katzenpost project, based on the "Loopix Anonymity System," which addresses previous challenges of high latency and unreliability. Gain insights into how Katzenpost supports various client applications, including encrypted messaging, cryptocurrency transaction transport, offline browsing, and interactions with Distributed Hash Tables and Conflict Free Replicating Data Types.
Syllabus
Introduction
What does anonymous mean
What is unlikable
Tor
Threat Model
How Mix Networks Work
Threshold Mixed Strategy
Architecture
Topology
Free Route
Route fingerprinting
Statistical disclosure
Finks Packet Format
Key Eraser
Multi cascade topology
Cryptocurrency Transactions
Cryptographic Works
Beyond Mix Networks
Questions
Taught by
media.ccc.de