407 research outputs found

    Dovetail: Stronger Anonymity in Next-Generation Internet Routing

    Full text link
    Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher level protocols, we propose a more direct solution: a routing protocol that allows communication without exposing network identity, providing a strong foundation for Internet privacy, while allowing identity to be defined in those higher level protocols where it adds value. Given current research initiatives advocating "clean slate" Internet designs, an opportunity exists to design an internetwork layer routing protocol that decouples identity from network location and thereby simplifies the anonymity problem. Recently, Hsiao et al. proposed such a protocol (LAP), but it does not protect the user against a local eavesdropper or an untrusted ISP, which will not be acceptable for many users. Thus, we propose Dovetail, a next-generation Internet routing protocol that provides anonymity against an active attacker located at any single point within the network, including the user's ISP. A major design challenge is to provide this protection without including an application-layer proxy in data transmission. We address this challenge in path construction by using a matchmaker node (an end host) to overlap two path segments at a dovetail node (a router). The dovetail then trims away part of the path so that data transmission bypasses the matchmaker. Additional design features include the choice of many different paths through the network and the joining of path segments without requiring a trusted third party. We develop a systematic mechanism to measure the topological anonymity of our designs, and we demonstrate the privacy and efficiency of our proposal by simulation, using a model of the complete Internet at the AS-level

    Timescale Dependence in River Channel Migration Measurements

    Get PDF
    Accurately measuring river meander migration over time is critical for sediment budgets and understanding how rivers respond to changes in hydrology or sediment supply. However, estimates of meander migration rates or streambank contributions to sediment budgets using repeat aerial imagery, maps, or topographic data will be underestimated without proper accounting for channel reversal. Furthermore, comparing channel planform adjustment measured over dissimilar timescales are biased because short‐ and long‐term measurements are disproportionately affected by temporary rate variability, long‐term hiatuses, and channel reversals. We evaluate the role of timescale dependence for the Root River, a single threaded meandering sand‐ and gravel‐bedded river in southeastern Minnesota, USA, with 76 years of aerial photographs spanning an era of landscape changes that have drastically altered flows. Empirical data and results from a statistical river migration model both confirm a temporal measurement‐scale dependence, illustrated by systematic underestimations (2–15% at 50 years) and convergence of migration rates measured over sufficiently long timescales (\u3e 40 years). Frequency of channel reversals exerts primary control on measurement bias for longer time intervals by erasing the record of observable migration. We conclude that using long‐term measurements of channel migration for sediment remobilization projections, streambank contributions to sediment budgets, sediment flux estimates, and perceptions of fluvial change will necessarily underestimate such calculations. © 2019 John Wiley & Sons, Ltd

    An Empirical Study of the I2P Anonymity Network and its Censorship Resistance

    Full text link
    Tor and I2P are well-known anonymity networks used by many individuals to protect their online privacy and anonymity. Tor's centralized directory services facilitate the understanding of the Tor network, as well as the measurement and visualization of its structure through the Tor Metrics project. In contrast, I2P does not rely on centralized directory servers, and thus obtaining a complete view of the network is challenging. In this work, we conduct an empirical study of the I2P network, in which we measure properties including population, churn rate, router type, and the geographic distribution of I2P peers. We find that there are currently around 32K active I2P peers in the network on a daily basis. Of these peers, 14K are located behind NAT or firewalls. Using the collected network data, we examine the blocking resistance of I2P against a censor that wants to prevent access to I2P using address-based blocking techniques. Despite the decentralized characteristics of I2P, we discover that a censor can block more than 95% of peer IP addresses known by a stable I2P client by operating only 10 routers in the network. This amounts to severe network impairment: a blocking rate of more than 70% is enough to cause significant latency in web browsing activities, while blocking more than 90% of peer IP addresses can make the network unusable. Finally, we discuss the security consequences of the network being blocked, and directions for potential approaches to make I2P more resistant to blocking.Comment: 14 pages, To appear in the 2018 Internet Measurement Conference (IMC'18

    A Model of Vertical Oligopolistic Competition

    Get PDF
    This paper develops a model of successive oligopolies with endogenous market entry, allowing for varying degrees of product differentiation and entry costs in both markets. Our analysis shows that the downstream conditions dominate the overall profitability of the two-tier structure while the upstream conditions mainly affect the distribution of profits. We compare the welfare effects of upstream versus downstream deregulation policies and show that the impact of deregulation may be overvalued when ignoring feedback effects from the other market. Furthermore, we analyze how different forms of vertical restraints influence the endogenous market structure and show when they are welfare enhancing

    CellFlood: Attacking Tor Onion Routers on the Cheap

    Full text link

    Expanding Economic Opportunity for More Americans: Bipartisan Policies to Increase Work, Wages, and Skills

    Get PDF
    Many workers today find themselves lacking the skills and training necessary to thrive in the modern economy. Most low- and middle-income workers have not seen meaningful wage increases in many years. Millions of men and women are missing from the workforce altogether. These challenges stem from profound shifts in the American economy and necessitate a dedicated policy response.Over the course of the past year, the Aspen Economic Strategy Group collected policy ideas to address the barriers to broad-based economic opportunity and identified concrete proposals with bipartisan appeal. These proposals are presented here
    • 

    corecore